cypherpunks
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
September 2013
- 75 participants
- 292 discussions
----- Forwarded message from harmony <harmony01(a)riseup.net> -----
Date: Wed, 18 Sep 2013 12:00:19 +0000
From: harmony <harmony01(a)riseup.net>
To: tor-news(a)lists.torproject.org, tor-talk(a)lists.torproject.org
Subject: [tor-talk] Tor Weekly News — September 18th, 2013
Reply-To: tor-talk(a)lists.torproject.org
========================================================================
Tor Weekly News September 18th, 2013
========================================================================
Welcome to the twelfth issue of Tor Weekly News, the weekly newsletter
that covers what’s happening in the closely-observed Tor community.
Official response to QUICK ANT disclosure
-----------------------------------------
Another round of speculation regarding the attitude of state
surveillance agencies towards the Tor network was provoked by a
slide [1] featured in an edition of the Brazilian current-affairs show
“Fantástico”, broadcast on September 8th [2]. The slide, leaked as part
of the ongoing Snowden disclosures, appeared to show a tab in the
alleged GCHQ [3] FLYING PIG surveillance interface labelled “Query
QUICK ANT — Tor events QFD”. Users on Reddit [4] and Twitter [5] began
to suggest possible attacks on Tor that might be managed through such an
interface.
Andrew Lewman posted an official response on the Tor blog [6] in which
he reiterated that “it’s not clear what the NSA or GCHQ can or cannot
do”, and that well-known theoretical attacks against the Tor network are
clearly described on the project’s FAQ page [7].
He further added that the tool in question was more likely to involve
“some ‘Tor flow detector’ scripts that let them pick Tor flows out of a
set of flows they’re looking at” than “anything to do with deanonymizing
Tor users, except insofar as they might have traffic flows from both
sides of the circuit in their database.”
Finally, he remarked that instead of engaging in speculation based on
limited evidence, “we’d rather spend our time developing Tor and
conducting research to make a better Tor.”
[1] https://people.torproject.org/~andrew/2013-09-10-quick-ant-tor-events-qfd.p…
[2] http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-st…
[3] https://twitter.com/ggreenwald/status/378185448293552128
[4] http://www.reddit.com/r/TOR/comments/1m3jum/gchq_tor_events_capture/
[5] https://twitter.com/jonathanmayer/status/377292928718499841
[6] https://blog.torproject.org/blog/tor-nsa-gchq-and-quick-ant-speculation
[7] https://www.torproject.org/docs/faq.html.en#AttacksOnOnionRouting
Entry guards and linkability
----------------------------
Leif Ryge pointed out [8] an issue with Tor’s current “entry guards”
system, whereby connections entering Tor from different points on the
same network could potentially be linked to an individual user based on
the three entry nodes selected by that user’s Tor client, which remain
constant for a period of 4-8 weeks [9].
Leif suggested that “assuming this is an accurate assessment, wouldn’t
it make sense to maintain separate sets of entry guards for each network
that the user connects from?”
Nick Mathewson replied [10] with an acknowledgement of the problem and a
number of reasons why simply generating separate sets of guards might
also harm a user’s anonymity: “You would *not*, for example, want to
maintain a different set of entry guards for every IP that you receive,
since if you did, a hostile DHCP server could feed you new IPs until you
picked a hostile guard. Similarly, if you are a busy traveler who
changes your view of what network you are on hundreds or thousands of
times, your chance of picking a hostile guard would rise accordingly.”
He also pointed out that “having a record in your state file of every
network you have visited is not necessarily the best idea either.”
Nick concluded by mentioning Roger Dingledine’s proposal to lower the
number of entry guards selected by a client to one only, “to avoid the
property of letting guard choices identify Tor clients”.
[8] https://lists.torproject.org/pipermail/tor-dev/2013-September/005423.html
[9] https://blog.torproject.org/blog/lifecycle-of-a-new-relay
[10] https://lists.torproject.org/pipermail/tor-dev/2013-September/005424.html
The lifecycle of a new relay: further research needed
-----------------------------------------------------
In response to some confusion on the part of relay operators over the
apparently slow growth in the use of newly-established nodes by clients,
Roger Dingledine posted on the Tor blog [11] a detailed account of how
new relays, and the bandwidth they supply, are gradually integrated into
the Tor network by directory authorities, bandwidth authorities, and
clients themselves. Roger stressed that “the descriptions here are in
part anecdotal”.
Roger outlined the four broad phases that define the development of a
relay within the network, and finished by offering a number of questions
for further research, under a general rubric: “what do these phases look
like with real-world data?” If you would like to contribute to the Tor
community’s understanding of the interaction between individual relays
and the network as a whole, please take a look both at the list of
sample questions and at Tor’s publicly-available archive of metrics
data [12], and see what you can find!
[11] https://blog.torproject.org/blog/lifecycle-of-a-new-relay
[12] https://metrics.torproject.org/data.html
Food for thought
----------------
“Back in the ancient pre-Tor days, at the height of the crypto wars,
Ian Goldberg asked me at Financial Crypto in 1998 why we created onion
routing. Not entirely facetiously I told him that the fascinating
technological problems and the potential to better protect people and
their activities was nice, but the real attraction was to create a
context where people who were sure they should hate each other were
forced to collaborate.” [13]
— Paul Syverson
[13] https://lists.torproject.org/pipermail/tor-talk/2013-September/030097.html
Tor help desk roundup
---------------------
The Tor help desk received a request for assistance setting up
Thunderbird to work with Tor. Thunderbird can be made to route
connections through Tor using the TorBirdy add-on. Further information
about using Tor with Thunderbird can be found on the wiki [14].
Another user wrote to comment on the lack of OpenSUSE support on Tor’s
rpm package page [15]. There is an open ticket concerning this issue,
but it hasn’t seen activity for some months [16]. A new ticket was
opened that addresses this concern more specifically [17].
[14] https://trac.torproject.org/projects/tor/wiki/torbirdy#BeforeusingTorBirdy
[15] https://www.torproject.org/docs/rpms.html
[16] https://bugs.torproject.org/4389
[17] https://bugs.torproject.org/9718
Miscellaneous news
------------------
The commitment level for the proposed Tor StackExchange page is hovering
at 88%; it needs to reach 100% before it will be accepted into beta. If
you think you will be able to contribute by answering questions from
current or potential Tor users, please sign up! [18]
[18] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privac…
Brian Callahan alerted relay operators running FreeBSD and OpenBSD to
the release of ports updated to the new tor 0.2.4.17-rc [19].
Christian Sturm then promptly announced the release of updated packages
for NetBSD, DragonFly BSD, illumos, Minix, and “other systems
potentially using pkgsrc” [20].
[19] http://lists.nycbug.org/pipermail/tor-bsd/2013-September/000044.html
[20] https://lists.torproject.org/pipermail/tor-talk/2013-September/030036.html
Karsten Loesing updated tor’s GeoIP database to the newest version [21].
Karsten also published the results of his memory usage test on a version
of tor that reports additional statistics, which he conducted using the
Shadow network simulator [22].
Finally, Karsten asked for comments on his proposal to retire the old
method of estimating user numbers on the metrics page over the next few
weeks in favor of a more reliable, more efficient system (which has been
in beta for some time already), and with it to remove the accumulated
data associated with the older method [23].
[21] https://bugs.torproject.org/9714
[22] https://trac.torproject.org/projects/tor/ticket/7359#comment:18
[23] https://lists.torproject.org/pipermail/tor-dev/2013-September/005443.html
Fabio Pietrosanti announced that the available cipher suites for
connections to tor2web.org have been updated to a much stronger
set [24].
[24] https://lists.torproject.org/pipermail/tor-talk/2013-September/030003.html
Robert published the results of an investigation into different kinds of
round-trip time (RTT) measurement, and their efficiency in building
circuits through the Tor network [25].
[25] https://lists.torproject.org/pipermail/tor-dev/2013-September/005440.html
George Kadianakis asked for comments on his early draft of a proposal
for different methods of migrating the Hidden Service protocol to a more
secure version [26].
George also pushed new versions of obfsproxy (0.2.3) and pyptlib
(0.0.4) [27].
[26] https://lists.torproject.org/pipermail/tor-dev/2013-September/005438.html
[27] https://lists.torproject.org/pipermail/tor-dev/2013-September/005441.html
In the course of a thread about the size of browser windows posing a
fingerprinting threat [28], harmony discovered that users of Ubuntu’s
Unity desktop should disable the “automaximize” behavior, as it can
override one of Tor Browser’s anti-fingerprinting measures [29].
[28] https://lists.torproject.org/pipermail/tor-talk/2013-September/030022.html
[29] https://bugs.torproject.org/9738
Tom Lowenthal submitted his monthly status report for August [30].
[30] https://lists.torproject.org/pipermail/tor-reports/2013-September/000339.ht…
Upcoming events
---------------
Sep 29 | Colin at the Winnipeg Cryptoparty
| Winnipeg, Manitoba, Canada
| http://wiki.skullspace.ca/index.php/CryptoParty
|
Sep 29-01 | Tor at OpenITP Circumvention Tech Summit IV
| Berlin, Germany
| https://www.openitp.org/openitp/circumvention-tech-summit.html
|
Oct 09-10 | Andrew speaking at Secure Poland 2013
| Warszawa, Poland
| http://www.secure.edu.pl/
This issue of Tor Weekly News has been assembled by harmony, Lunar,
dope457, Matt Pagan, and Karsten Loesing.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [31], write down your
name and subscribe to the team mailing list [32] if you want to
get involved!
[31] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[32] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
--
tor-talk mailing list - tor-talk(a)lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
1
0
----- Forwarded message from nettime's_chronicler <nettime(a)kein.org> -----
Date: Fri, 13 Sep 2013 17:15:26 -0100
From: nettime's_chronicler <nettime(a)kein.org>
To: nettime-l(a)kein.org
Subject: <nettime> Yochai Benkler: Time to tame the NSA behemoth
Reply-To: a moderated mailing list for net criticism <nettime-l(a)mail.kein.org>
<http://www.theguardian.com/commentisfree/2013/sep/13/nsa-behemoth-trampling…>
Time to tame the NSA behemoth trampling our rights
From leaks and Fisa court papers, it's clear the NSA is a bloated
spying bureaucracy out of control. It can't be reformed by insiders
Yochai Benkler
The spate of new NSA disclosures substantially raises the stakes of
this debate. We now know that the intelligence establishment
systematically undermines oversight by lying to both Congress and
the courts. We know that the NSA infiltrates internet
standard-setting processes to security protocols that make
surveillance harder. We know that the NSA uses persuasion,
subterfuge, and legal coercion to distort software and hardware
product design by commercial companies.
We have learned that in pursuit of its bureaucratic mission to obtain
signals intelligence in a pervasively networked world, the NSA has
mounted a systematic campaign against the foundations of American
power: constitutional checks and balances, technological leadership,
and market entrepreneurship. The NSA scandal is no longer about
privacy, or a particular violation of constitutional or legislative
obligations. The American body politic is suffering a severe case of
auto-immune disease: our defense system is attacking other critical
systems of our body.
First, the lying. The National Intelligence University, based in
Washington, DC, offers a certificate program called the denial and
deception advanced studies program. That's not a farcical sci-fi
dystopia; it's a real program about countering denial and deception by
other countries. The repeated misrepresentations suggest that the
intelligence establishment has come to see its civilian bosses as
adversaries to be managed through denial and deception.
We learned months ago that the Director of National Intelligence
James Clapper lied under oath to Congress. Now, we know that
General Keith Alexander filed a "declaration" (which is like testifying
in writing), asserting an interpretation of violations that the court
said "strains credulity". The newly-disclosed 2009 opinion includes a
whole section entitled "Misrepresentations to the Court", which
begins with the sentence:
The government has compounded its noncompliance with the court's
orders by repeatedly submitting inaccurate descriptions of the alert
list process to the FISC.
General Alexander's claim that the NSA's vast numbers of violations
were the consequences of error and incompetence receive derisive
attention. But this claim itself was in a court submission intended to
exculpate the agency from what would otherwise have been an intentional
violation of the court's order. There is absolutely no reason to
believe the claims of incompetence and honest error; there is more
reason to assume that these are intended to cover up a worse truth:
intentional violations.
Second, the subversion. Last week, we learned that the NSA's strategy
to enhance its surveillance capabilities was to weaken internet
security in general. The NSA infiltrated the social-professional
standard-setting organizations on which the whole internet relies, from
National Institute of Standards and Technology to the Internet
Engineering Task Force itself, the very institutional foundation of the
internet, to weaken the security standards. Moreover, the NSA combined
persuasion and legal coercion to compromise the commercial systems and
standards that offer the most basic security systems on which the
entire internet runs. The NSA undermined the security of the SSL
standard critical to online banking and shopping, VPN products central
to secure corporate, research, and healthcare provider networks, and
basic email utilities.
Serious people with grave expressions will argue that if we do not
ruthlessly expand our intelligence capabilities, we will suffer
terrorism and defeat. Whatever minor tweaks may be necessary, the
argument goes, the core of the operation is absolutely necessary and
people will die if we falter. But the question remains: how much of
what we have is really necessary and effective, and how much is
bureaucratic bloat resulting in the all-to-familiar dynamics of
organizational self-aggrandizement and expansionism?
The "serious people" are appealing to our faith that national security
is critical, in order to demand that we accept the particular
organization of the Intelligence Church. Demand for blind faith
adherence is unacceptable.
What did we actually know about what we got in exchange for undermining
internet security, technology markets, internet social capital, and the
American constitutional order? The intelligence establishment grew by
billions of dollars; thousands of employees; and power within the
executive. And we the people? Not so much. Court documents released
this week show that after its first three years of operation, the best
the intelligence establishment could show the judge overseeing the
program was that it had led to opening "three new preliminary
investigations". This showing, noted Judge Walton in his opinion, "does
not seem very significant".
If this was the best the intelligence community could put on the table
when it faced the risk of judicial sanction, we can assume that all the
hand-waving without hard, observable, testable facts is magician's
patter, aimed to protect the fruits of a decade's worth of bureaucratic
expansionism. Claims that secrecy prevents the priesthood from
presenting such testable proof appeal to a doctrine of occult
infallibility that we cannot afford to accept.
In August, 205 members of the House voted in favor of the
Amash-Conyers Amendment that would have rewritten Section 215 of the
Patriot Act, the section used to justify bulk collection of domestic
phone call metadata. At the time, this was a critically important move
that was highly targeted at a narrow and specific abuse. But the
breadth and depth of organizational deception and subversion force us
to recognize that we need reconstruction that goes much deeper than any
specific legislative fix.
We need a fundamental organizational reform. The so-called "outside
independent experts" committee which the president has appointed, with
insiders' insiders like Michael Morell and Richard Clarke, will not
come close to doing the trick. Nor is it likely to allay anyone's fears
who is not already an Intelligence Church adherent.
Given the persistent lying and strategic errors of judgment that this
week's revelations disclosed, the NSA needs to be put into
receivership. Insiders, beginning at the very top, need to be removed
and excluded from the restructuring process. Their expertise led to
this mess, and would be a hindrance, not a help, in cleaning it up. We
need a forceful, truly independent outsider, with strong, direct
congressional support, who would recruit former insider-dissenters like
Thomas Drake or William Binney to reveal where the bodies are buried.
Anything short of root-and-branch reconstruction will be serving weak
tea to a patient with a debilitating auto-immune disease.
# distributed via <nettime>: no commercial use without permission
# <nettime> is a moderated mailing list for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nettime(a)kein.org
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
1
0
// note: my cypherpunks posts are copyright free
--- overview ---
the application of [crypto] appears to occupy a dual realm, spanning both
the need for /secrecy/ and the need for /security/, which it is assumed may
require different approaches in how in its design and functioning, and the
'systems' may operate within different parameters- say a secure facility
with employee IDs that involves managing secrets, versus an SSL exchange
using a web browser to search google.
It would seem to an outsider, unknowing actual parameters involved, that
some technology functions more as a secure mode and others as a secret or
hidden mode, and that this may be different in that data may be readily
accessible or known at endpoints or throughout an infrastructure whereas in
another this could be so tightly controlled as to involve almost personal
secret-keeping between those who access purposefully hidden 'information'
that must be kept contained, out of existing channels, or activated in a
different realm or zone of operation, say peer to peer with another who
also shares the secret yet not communicating about what it is, yet in
having access to the knowledge it recontexualizes shared observation and in
some sense could function as if a shared key has been passed and a secret
corridor or psychic tunnel or 'secret network' exists as a result of those
who know what is /unknown/ versus those who remaining unknowing what this
could be in the infinity of potential particular views of any given event
or idea or truth.
whereas accessing a webpage with some anonymity in the data transmission
may involve a largely known exchange, excepting for those on the outside of
the shared infrastructural connection; and so it is more a data security
approach versus centered or focused on /secrets/.
thus for different observers, the question of the Crypto State could tend
more towards the maintenance and ethics and implementation of an approach
to manage protect and exploit [secrets], which could be government and spy
agency focused on its internal and peer state connections, whereas for
another population, the citizenry, the issue of crypto could function most
in a context of [security], as if a realm delineating a lawful boundary or
property line that is potentially protected by law, and possibly is most
focused in the business, legal, and institutional realm. this is a basic
hypothesis so those who actually know this situation could model it in a
more accurate framework, whatever it may be, between security and secrecy.
i do not believe that an issue like state surveillance can be disconnected
from its actual deeper purpose, which few more know of or by NDA be unable
to communicate to others and thus an issue of faith in its mission can be
evaluated either in aligning with a patriotic ideology, which is incredibly
dangerous if checks and balances are gone from government accountability,
or in an accurate modeling of the truth of the situation and the framework
events are occurring within- that is, context.
everyone knows that lawlessness exists in the realm of corporate use of
private data to make money, either through data mining or private
surveillance, just look at the aggressive panhandling via advertisements on
every webpage, as if billboards have their own AI agenda as spore lifeforms
and are trying to secure their future against competing words and ideas
that they seek to distract from and cover or automatically play video or
audio and use up network data streams as constant 'junk data' and yet it is
citizens who are paying for this malfeasance, businesses and unscrupulous
money makers exploiting the common realm to extract as much profit as
possible at the loss of even readability in a majority of scenarios. and
there is no *legal issue* with this kind of deterioration of what could in
some sense be a public space in some sense that has been overtaken by a
private negligence, selfishness, and greed that defaces and devalues it.
perhaps this is a shared business model and yet it is also rotten, and so
like driving through a wasteland of a ruined environment, the webpages and
internet is like seeing broken buildings using a broken vehicle, driving on
broken roads and thoroughfares, with collapsed and dilapidated structures
and a giant signs HUMANS ARE THE ENEMY everywhere you look and turn,
mocking people with the brazen disregard for sensibility, honesty,
everything in your face and hateful, tending towards the worst content and
worst innuendo, and this is normalized as the shared realm of public and
private exchange, online.
and in that context people and mass media and states are communicating
about what presidents say, about wars and war making and terrorism, and
about poverty and illness and disease and the inability of society to meet
its needs while others sit at the top of this giant heap of societal dung
and count their money earned by selling the broken society to begin with.
so the first observation is that the state is fucked. completely utterly
and irreversibly fucked. its core code is rotten and the effects of this
are everywhere, including in peoples mindsets and decision-making that is
born of this ideology, reinforcing the binary perspective from previous
generations that has become an an error-reliant inaccurate biased POV that
is allowing this exploitation to continue under the shield of "legalese",
yet which itself is ungrounded and turns the signage of language into truth
and thus internalizes the world within a private communication about it
where this communication becomes the truth, via language that can control
and overpower another perspective, not via honest evaluation of truth. thus
language games in place of actual justice, and this normalized, 'codified'.
businesses themselves hiding behind this code, lawyers by their side, to
allow any kind of extractive process of data or money to occur, no
liability yet allowing swindles cheating and corporate and institutional
theft to be legalized, without public benefit even, and citizens data and
material existence then become natural resources to be exploited, further
extracting every last available bit for someone else to profit from, while
they see nothing in return except choices of skinnerian behaviorism, lives
becoming mouse mazes, the less money you start with the sooner trapped and
the whole society about siphoning off goods and resources, winnowing the
few who proceed upward, stopping the rest in the lower middle class, and
then breaking down people and pushing them further and further until at the
bottom of society in unrecoverable circumstances, the societal trap door of
poverty enforced as part of an ideological agenda, religious belief needing
the failures to be the immoral castigated many who justify the superiority
of everyone above- yet it is the result of gaming the state and its
collapse in a pyramid scheme that enslaves the many to prop up the false
perspective benefiting the very few who actually believe all the B.S.
because it most benefits them, as if some kind of twisted utopia for
psychos who are unconcerned about others beyond their private boundaries.
if you consider [crypto] in this economic, political, social context,
actually the broken cryptographic systems actually massively benefit this
exploitative scheme entirely at every level, both as secrets and security.
it provides an impenetrable wall of ideology that, alongside the Binary
Crypto Regime, allows a type of reinforced inevitability of the solution,
*if only you could do the math you would realize how great all this is*.
and so double/triple schemes this may be so, never underestimate humanity,
yet for those uninitiated it is hellishly terrifying, especially the closer
you are to the bottom where these dynamics grind down the lowest layers and
push people prematurely into caskets or have no ethics in discriminating
against those unlike, who have no protection against exploitation and even
violence against them, yet viewed seemingly as the greatest threat because
they are using resources that belong to others, as if only takers en total.
what is also most evident is the role of neurolinguistic programming (NLP)
in federal, state, corporate, educational and institutional contexts to use
'brute force language' to engineer a particular kind of next iteration, as
if this one-way language manipulation has replaced shared reasoning, due to
the loss of empirical truth and its accounting, and an unrestricted triumph
of relativism and its authoritarian agenda of administering the next wave
of the self-same ideology, yet with their own people, no more charade with
mr. and mrs. nice anymore. its just their people now, The State, Inc.-
whether it is business, government, education, health care, community.
how do things get this fucked up unless that is what you're aiming for? and
this in this way it is truly MASTERFUL. brilliant. the art of the state.
so in this context there is an issue like /taxes/ that when the state began
had to be figured out from a condition of injustice and revolt which led to
a new independent society and democratic form of governance. feedback-based
in principle. and then over centuries this short-circuited due to limits in
the code and its interpretations, say equal rights for women, then citizens
and various other fracturings from a once shared POV of private men that
were assumed to be 'the public', that is, within western european history,
and over time these conditions changed and yet the underlying code did not
that led to contradictions and even INVERSIONS that could force breakdowns
of the same society via exploits and hacks that challenged the processing
and upon Supreme Court or other legal review, flip bits somewhere and the
larger situation was transformed for everyone, changed by smaller events
elsewhere. and the state has both continued its development towards human
improvement while similarly deteriorating at the same time, its faulty code
and programming the source of its own self-destruction and annihilation,
such that /truth/ has been replaced by unrestricted and unregulated and
essentially 'unchecked' /power/ via this biased, relativistic framework in
which - oh, i don't know - the world's largest military machine and global
spy network operate under, in an inaccurate and biased private viewpoint
for mass surveillance and the hunt for terrorists- which can thus be skewed
an distorted to focus on citizens instead who may question these dynamics,
which then turns public consciousness into the enemy of this secrets-based
and heavily secure tyranny, indistinguishable from a dictatorship yet not
accounted for this way, as the dictator is hidden, out of sight, etc. and
so the false perspective reigns and rules over 'what can be reasoned' and
if anyone crosses that line, the private police enforcers and spies are at
your doors and suddenly all your e-commerce goods are being shipped broken.
and thus taxes are supporting this lawless takeover of the government and
yet it is also inevitable due to the way the state is configured and the
code it is running on and for lack of a better alternative, until that can
be presented- this is the situation. so, some sympathy for the dictator.
though if the options are destroyed by tyrannical actions then you got real
problems because then the leader is insane and functioning against the
shared state, in that the agenda becomes antihuman, aligned with machines
and the continuation and development of the automated machinery of state,
which in terms of the ideology are godless, yet involves a priesthood of
technocrats - including programmers and technologists and business people,
for whom this system is operating under their guidance and parameters and
towards their goals, which have become detached from the citizenry itself.
so there is the aspect of enslavement, disenfranchisement of populations
based on discrimination and sliding-scale rulesets preferring some over
others and also rewarding violence against citizens in its ecosystem. and
the entire population is wired to automatically support this via taxes yet
the /feedback/ is not occurring to improve their own basic situations as
the erosive aspects of cultural decline outweigh everything else and in
this constant pressure, break down and dissolve connections and structures
required for survival, including loss of meaningful work, family units,
education related to the world that exits versus citizens trained as if
robots, and 'media' that devolves everything into an animalistic context,
nearly pre-literate, not in the McLuhan sense of higher understanding of
oral or other cultures, and instead- inculcating ignorance, bias, hatred,
factionalism, racism, and this via false-perspectives as if 'shared POV'.
no one required to align or attest or be held accountable for truth,
instead ENRONOMICS rules, you can game the system and win at every level,
and thus it involves the takeover by these same forces of the environment
and state itself- its bureaucracy falling hostage to such an ideology, and
citizens no longer having a government which represents the public's needs.
this is relativistic private government taken to its extreme: tyranny, yet
not only that- CRYPTO dictatorship. and yet it started out as a public and
private government with human ideals and orientated to life, and instead
has become antihuman and polluted, ideologically, environmentally and in
minds and bodies, and focused on death and money as if the highest good.
and so it is a question- where is /truth/ within this government- does it
even exist? and it would seem that for the ideologically invested, the
truth is the surface event, the signage and ideological actions that as
imagery reinforce a particular viewpoint conducive to true belief-- that
money is the most important, and that these people believing themselves
superior really are in control, and that they justify this enslavement
based on their private agenda and goals. and thus the *secrets and
security* of the crypto state could align with this binary belief system
and seemingly be its support structure, including for keeping tabs on all
the exploited, as if in an excel spreadsheet, to determine futures via
routing to the appropriate cattle chutes, whether death panels or poor
schools or blacklists. everyone surveilled for their profit.
whereas another truth could coexist beyond or along-side of this and yet
remain hidden from the binary ideological which is bounded by its
self-validation, pattern matching via limited and controlled observation
and thus observer bias the threshold for 'shared reality' and shared goals.
instead of relying on the corrupted and error-ridden code of pseudo-truth
and its role in 'development' of business, education, healthcare, etc via
lies, distortion, self-serving exploitative agendas- instead another actual
[truth] could exist that is shared, that involves a different context for
issues of /security/ and /secrets/, and cryptographic systems and their
applications also would span into this realm of activity, by default of its
service to the soul of the state, to ensure long-term functional integrity
and this can be assumed based on indications such a parallel agenda exists.
it would seem most [crypto] in the profane model would be functioning in a
different set of parameters than in the more sacred and militarist model,
whereby enforced ignorance and outright corruption is not the rule or law.
and thus the cosmic setup and making preparations for this to be resolved.
--- rebooting the state ---
it concerns me to be called before a judge because i do not believe the
state is a legal entity and believe i can readily prove this to be the
case, and therefore not recognizing the legality of the state to decide in
matters of law would be contempt of court, from my previous understanding.
and in this way, to be imprisoned for not recognizing its authority to
determine what is just or to be able to enforce the right principles within
law as it exists due to a failed constitutional context.
i run it over in my head, the argument of having private man define what is
a human predicament, and thus 'mankind' and 'his' and history stand in for
humans and women as an ideological bias which, while once public, became
private upon equal rights, including for those other other ethnicities yet
this privileged hierarchic onsesided perspective has been
institutionalized as if representing the total public via the shared
private views of men, and in the attempts to equalize it, has further
privatized other views of women and ethnicities, into a many privates
worlds situation without a coherent shared framework to call or reason as
'the public' of us all.
'the human' is missing. the human state is non-existent, and the private
state of various wo|men and their private rights rule over humanity, the
subset governing as if superset, yet without higher ideals, instead lower.
the constitutional code is corrupt. and yet in its description it has the
rules to deal with this: call a Constitutional Convention and start again.
yet in a society run by relativism there is no ability to 'reason' beyond
the privatized ideological "theoretical" discourse whereby power politics
determines what is true (pT=>0) and then rubber-stamps via institutions
under its guidance to manufacture consent and thus: represent 'the people'
whereby only some truth is allowed that only benefits some people at the
expense of everyone else. unbalanced, biased, onesided most times, really.
so-- dealing with MASS ILLITERACY here, since the education system fell to
relativistic ideology and binary bias as a teaching and indoctrination
method, the rote exercises and standardized tests indication that no actual
thought it allowed, no thesis - antithesis -> synthesis in western culture
anymore, unless of an ungrounded politically correct version based within
*language* and about the [signs] or appearance of shared views, yet without
the truth shared or grounded in this false perspective. thus, foundations
of belief are built on weak and corrupt 'ideas' and 'concepts' which have
also become the mainstream discourse -and- POLICY BASIS for the state--
that is, skew distortion warping and bias as the reasoning for shared
decision making and governance. whose that benefiting when *celebrities*
are the best at taking on such an acting role of serial killer fiction.
so someone calls a constitutional convention and no one is capable of
*reasoning* about what is happening in the shared situation because many
are essentially BELIEVING THEIR OWN BULLSHIT on ego-reliant frameworks
based on ideological bias and error, into a too simple assessment of truth
that is pre-enlightenment at this stage, pre-western culture even, devolved
to a realm of selfish idiocy and stupidity that only self-indulgence can
really offer to the existing degree. thus, everyone is a celebrity in their
own private facebook and twitter worlds and speaking their own languages
from their own perspectives and talking the talk, in so far as it profits
and is allowed in models of pseudo-truth-- not the nails hard empirical
realm where errors in thinking are not allowed or acceptable for shared
frameworks-- this is beyond or before scientific method which similarly
fails via privatized empiricism (also perspective limited via 'history' and
thus privatized, allowing aggressions against humans in that framework by
way of distortions, errors- exploited, targeting enemy populations, etc).
yet a lot of people can 'program' yet it is stuck in bias and ideological
frameworks and therefore very smart "binary thinking" gets nowhere in the
real world of paradox, to deal with problems and situations as they exist
rather than as they are perceived to- which is a tremendous difference and
requires actual difficult and painful and humbling considerations and it is
quickly realized how little a person knows- versus to presume to know all
by sharing a viewpoint beyond external correction or acknowledging that
there is bias or distortion or even unknowing involved- theorized POVs
rule, the ego of private identities as if public, as if shared views, yet
without the rigor or political suffering that involves beyond 'the drama'.
and thus soap operas of initiatives, everyone wearing their private causes
and yet outside an actual PUBLIC CONTEXT and language and social relations
and importantly -- identity -- that would allow the issues to be dealt with
beyond adolescent playpen antics and excitements and temper tantrums. here
or there someone probably assassinated for actually doing something wrong,
though who knows, maybe that too is drama and they are in deep state now.
and logic is crucial, yet absent as an accounting of 'reasoning' which
instead like NLP becomes programming via onesided binarisms competing up on
the various electronic stumps, trunks, and platforms. 3-value and N-value
logic, the basis for /human/ reasoning in a neutral evaluation as observer
are not taught in schools. everything is 'rationalized' yet in pseudo-truth
and thus an infinite many viewpoints that do not add up to more because
they rely on the errors and distortions as structural scaffolding, on the
bias and ideology to uphold views, as is necessary of private language-
women as bad as men, ethnicities exploiting this as much as others, that is
the game it involves and everything and everyone devolves as a result.
The State needs to be rebooted under new constitutional code, at the very
least modified from a context of public and private man, mankind, and
history to that of public humanity and private wo|men, involving a shared
his|her-story or human story. corporations embodied as 'individuals' as
'private men' have allowed extreme competition with citizens to the point
that the state is representing corporate democracy via 'the public' vote,
the citizens are Microsoft, Google, Time-Warner, CBS, Halliburton, etc.
those not part of the structures are serfs, indentured class, castes.
whereas in a human context, the state would need to serve not exploit human
goals and values as part of a shared community, not gain profit based on
exploiting and brainwashing or cheating people in retrograde schemes or
outright criminality via selling broken equipment to normalize thievery.
the human context for law would likewise not be able to ignore such truth
as it would be allowed and not censored as a viewpoint via relativism. and
likewise /security/ and /secrecy/ would likewise change to serve humanity
and differentiate and focus on those seeking to abuse and exploit instead.
it is this last statement that is assumed the underlying hidden, secret
aspect of existing crypto systems of the state, a standing reserve that is
waiting in the wings, surveying the situation so it can be accounted for.
as of my recollection at this point, it is unknown if i am the only person
who could make this case for the illegality of the state in its existing
functioning, yet anyone who were to deny the court its legality would
potentially be able to make this case, if willing to go to prison and get
the process underway, though the argument would need to be allowed else you
may never get out of prison, which is why it seems a worst case scenario,
unless that situation would be the first opportunity to make the case. and
this in a context of what is proposed to be *ungrounded legal frameworks*
due to ideological language relied on for 'shared relativistic reasoning'
which functions as /programming/ again, as if shared though of unshared
society, continually set at odds with itself, functioning against itself,
increasingly nonsensical and illiterate-- schizophrenic even, as the views
do not add up to a coherent whole, the parts make their sum impossible, as
it tends towards shared nothingness- not towards life or greater being. in
this way, ignorance is progressively institutionalize, made into rules and
increases suffering, making it more and more difficult to 'reason' within
the broken world and relate to others in their privatized biased views.
statisticians become the new community organizers for the disenfranchised
and lost, tallying peoples identities with others moreso than communities
themselves or organizations, the alienating and isolation near complete,
such that the internet and WWW as stage set appear as if by divine right to
allow each actor their fantasy to portray, without restriction to reality,
obligation or duty to another, as if life only a game, frivolity behold. no
sense of the pending doom awaiting, the trap door beneath the spotlight.
the word as a mirror then, and the networked playground for narcissists
that on a psychological level reveals the deep and hidden contempt and
shallowness of the economic, social, and political ideology of self-bias.
you need at least two people to call a constitutional convention, yet what
if it is flash mobbed and a million relativists show up with bullhorns?
here: "use our code! use our code!" they start screaming in unison. that is
it in its entirety, all that binary relativistic reasoning needs to keep
things as they are and further extent the situation towards shared falsity.
that is why there are guns i am guessing. make a perimeter. only logical
reasoning allowed, and at every instance the binary will be defeated in its
simplism and will no longer be enshrined as law nor ideology nor allow for
the corrupt rule of the many by the few who do not realize how crazy they
actually are, nor how completely hollow and sold-out as human beings.
my wager is i can prove the state in its current form is unconstitutional
and provide the logical framework for making that case, and offer a set of
corrective actions that would neutralize the existing bias, recontextualize
its constitutional framework via what are essentially structural "edits"
based on logic, to remove known ideology, and this could allow a framework
for establishing or reconsidering the constitution via a convention once
"ideas" themselves are back on the table, versus extending programmatic
language according to biased rulesets held in pseudo-empirical books that
skew this way or that depending on the forces at work, depending on words
and signs versus on truth and logical reasoning as the basis for judgement
and decision-making, in that ideas must be mediated at the level of 1/0.
anything else is an ungrounded concept, a fiction, a theory by comparison,
an assumption based on previous assumptions, which is what ideology is:
basing reasoning on previous answered questions versus asking them anew.
really asking questions versus skipping the truth and relying on the
structure as if 'wholly true' and not involving skew, say of history as
this may influence perspective and limit certain 'shared observations' by
promoting a private framework for evaluation. and the consequences of this.
i do not want to go to prison to get the conversation started, mainly
because i would probably never get out, as 'logical reasoning' has no place
within these state systems and instead they are mediating relations based
on power and shared private ideology at that. perhaps high-minded Supreme
Court is the actual and best platform to evaluate these state code errors
accurately and authorize the necessary edits to reframe and recontextualize
the state in a new human framework where citizens have a responsibility to
the state, both public and private, and that in return the state will serve
humanity, including by reconceptualizing the monetary system, business
relations and obligations to environment and the state development,
education, health and in general- the shared awareness and well-being of
those of shared destiny.
if the code of the Constitution is in error, it must be error-corrected--
this is not Microsoft Windows-- or, actually, it is The State as Windows,
broken windows everywhere, made to break, made to be exploited, for profit.
that is, the corruption is a downward spiral as private business model, and
perhaps this is part of the crypto gambit itself, providing instruments to
enable and sustain the deterioration, as the codebase moves towards babel.
fragile error-ridden code that needs to be enforced by power politics and
bullying as if "reasoning" via violence and intimidation based on shared
bias of binary ideology, versus robust thinking based on shared empirical
truth in a gray-area of consideration and evaluation, paradoxical, real,
wanting to debate the hypothesis and even have observations show wrong or
faulty to learn and improve upon frameworks, win/win interactions within
debate versus stand-offs with true believers who ignore truth instead, and
pick and choose their private reality and believe their bubble state will
always exist the way it is, versus be popped and fall to another worldview.
the requirement is strong relations between individuals and groups based on
logical reasoning-- that existed as the empirical basis for development of
the U.S. Constitution and would be required as a prerequisite again to be
able to fairly and accurate model issues of the state beyond a partial
too-limited biased viewpoint of the shared citizenry. It may be the first
real 'public' state in that it would be the first human state in existence,
seemingly, in terms of the specific requirements for the appropriate kernel
of truth by which to align all other actions and interrelated activities
within its structural arrangement. it may actually allow 'America' to be
the potential envisioned, beyond the limits of history, and truly finally
offer options that have existed as potentials yet have not be allowed
within the limited frameworks due to unshared language, logic, and
observation that could not be reconciled by ever-narrowing private POVs.
this is to assume that shared value of the state is [truth] at its core,
and that logical reasoning must be error-corrected at this level for ideas
to be given their value, and not to assume this or allow it for the
pseudo-truths that rely on false frameworks and errors if not outright lies
that have become protected by the ideology of law instead, in service to
shared falsity that endlessly exploits the citizenry to serve the powerful
few.
perhaps the most important issue underlying this transformation would be a
new currency that could function in a realm of data exchange and allow for
fidelity with transactions and relations as they exist, as infrastructure
of interconnected relations that feed this motivational current throughout
the state, yet which has no data dimension today in terms of its fractional
values, such that .001 may be a useful measure for online contexts, or that
taxation could be automated into the currency itself, so that it is not an
issue of people relying on third-party accountants to balance their books
and instead it is part of the feedback process inherent in the currency
itself, taking the bureaucracy out of bureaucracy and allowing money to be
friction free in terms of exchange, and allow various interactions that are
instead limited by broken and biased models of accountability that punish
those without money the most, making it impossible to function in society
as if they are cheating because the system itself is broken, when instead
the very tax forms do not have the basic information to allow the literate
to do their own taxes, even in the most expected scenarios of Social
Security payments-- both at state and federal levels, instead obfuscation
and then the setup, the threat of holding individuals accountable for the
errors, as is the social services game, working against the poor, rigging
the system for failure, using pressure and oppressive subversive actions to
try to indict criminality based on broken systems used to frame citizens
who dare try to live beyond the limits, and escape conveyer belt to the
awaiting cardboard coffin, paid for by web advertising tattooed on skull.
...
"the very interaction in a context of verifiable truth is the weakness of
liars who need to sustain the shared lie in order to function" - /tells/
would be automatic as circuitry grounds to falsehood versus truth.
(so you're talking about an inversion, huh?)
enforced illiteracy versus freedom of ideas, based on securing of truth
within the state, making it foundational and defining reasoning based on
logic and accounting within accurate models, concepts, and hypotheses,
using the human observer as the basis for shared empirical viewpoint.
--- why cryptography matters ---
programming consciousness, building peer relations, feedback based tools,
'know and develop your circuitry', self as circuit, ideas as circuits,
models and concepts as circuits. fundamental knowledge and exchange based
on shared value (T) built from the ground up, literally, electromagnetic.
tools for thinking, tools for literacy, for grounded empiricism, education
in hardware/software models, logical reasoning as the basis, to allow for
it and develop it, share the techniques, guidelines/guidance, for debate of
ideas, litmus, standards, crack the ideological code.
the code potential.
issue of pattern matching to the wrong model: binary [crypt.1] / paradoxic
[crypt.2] -- it is in the unknown, or the known unknown -of its capacity-
that the cryptographic could establish a model for programmatic LITERACY
that someday may be the basis for shared awareness outside the realm of
secrets and secrecy and instead between citizens within new parameters of
relation and exchange, whereby the existing model is transformed...
antihuman [observer.1] <---> human [observer.2]
wherein all exchange is biased to the following dynamic:
antihuman [observer.1] <---- human [observer.2]
antihuman [observer.1] <---> antihuman [observer.2]
Instead, this could be transformed by logical accounting for truth in
biased and ungrounded 'theoretical' models reliant upon shared and
sustained falsity, thereby invalidating the 'shared perspective' and
requiring actual [truth] as the measure for shared human observation...
human [observer.1] <---> human [observer.2]
the antihuman viewpoint relies on shared bias as the basis for shared
awareness, 'shared ideological belief' essentially, and would be replaced
by shared empirical models of truth based on *logical reasoning* (not
shared binary bias) via 3-value and N-value evaluations.
in each instance the /crypto/ would be different, in particular the second
example whereby exploited or compromised crypto could be feeding a false
perspective, leading to example three where a surveillance state could be
internally believed serving this private ideological constituency yet also
be backdoored elsewhere, beyond the limit of their models of awareness.
the fourth, last example being the future or other hidden crypto systems
that a future state may develop in terms of a line of demarcation between
the human and antihuman interactions, in that security and secrets occur in
that realm of conflict in terms of unshared identity, goals, values, etc.
and thus likewise, 'money' or 'currency' in these differing scenarios,
taxes or politics or social services, etc. what is true is true. and then
there are also black swan events that challenge the model, its assumptions.
either/or, both/and, neithor/nor, switches and electronic circuits as they
relate to relations of observers, set theory dynamics as daily encounters.
war and peace in a realm of language and bureaucracy, hidden within logic,
its lack of accounting. security through obscurity or the deep strategy.
nothing like communicating like a barking animal, rawr rawwr rawrrrr!!!!
rowwf! ROF! WROFF! wwwWWRRRAAOAOOFFFFFFFFF!@!@@^...
--- more on crypto model ---
there is truth, there is logic, and logical reasoning in turn which
mediates 'ideas' - evaluating patterns and constructing hypotheses via
concepts and models.
T <-> logic <-> reasoning <-> [ideas]
so if you have /binary/ logic, you get binary reasoning and binary models
and thinking, whereby if a pattern is matched, it is by default 'true'.
T <- binary reasoning <- [pattern match]
thus is the structural bias that if pseudo-truth is the value [pT] then
false absolutism inherently includes error in this 'accounting for truth'
as if it is purely true versus reliant on skew, distortion, error, etc. in
this way the image or sign=sign is an ungrounded validation of the ideas if
they are only 'partially true' yet not recognized as such, thus ungrounded
in the total idea said to be represented. normalization and reliance upon
false positives to prove sustain extend the false perspective modeling.
this is the ideological approach of binary programming as 'philosophy'. it
is the Binary Crypto Regime belief system, as if 1/0 is guru accessible via
choosing beliefs in private frameworks of relativistic observations, often
based on power and privileged perspectives, whether biz or tech celebrity,
popular professor or self-righteous activist. the skew is the twl
and thus the pT<->T gap is the security and secrecy exploit, a structure
made to be exploited, yet it may not be recognized in the mindset itself in
terms of lack of accurate self-reflection, thus a psychological flaw in the
observer that tends towards psychopathy, narcissism, and anti-human agendas
or so life experience offers that as an evaluative framework to consider,
perhaps only validated when the have their extermination camps up & running
or the existing ones are revealed: poisoning environment, food, minds, etc.
what was realized upon sharing the model of crypto in relation to language
was that programming functions as a form of reasoning, and so considering
that there are limits to binary programming versus paradoxical, in terms of
the code possibilities of linear versus nonlinear evaluations, this also
holds true for 'ideas' and conceptualizations of what exists as it exists
and what must be held outside the frameworks because they cannot account
for anomalies-- the binary ideology is reliant on censoring and throwing
out data that does not conform, whereas the paradoxical 3-value and N-value
models retain this 'fine detail' of various intricacies of interstructural
dynamics as a basis to discern more accurate (shared, empirical)
frameworks and in this way *trash is treasure*, or the relation between
archaeology and architecture, past and future meeting in the present with a
question.
1 <-> logical reasoning <-> [ideas]
if you get the ideas right, grounded in truth, the concepts and models,
then the code 'as language' is going to accurately mediate this relation
between /signs/ and the things they represent, or ground to, in/as truth.
1 <-- [code] <-- programming
in this way, if the 'ideas of code' are accurately modeled and grounded,
their implementation would be validated by truth and its error-correction
of the faulty code would be vital to securing truth within the model
0 <-- [pT.code] <-- 'binary reasoning' *
whereas a worldview and model based on an unfalsifiable approach that is
removed of error correction may have 'some truth' though its further and
further reliance on error-reliant frameworks would continuously move this
'shared view' closer and closer to zero, instead of 1, via the increasing
dissolution of truth within a larger ever expanding framework of falsity.
in a complex multiple-use model involving deception, such unaccountable
code could not only be used as an exploit, the programmatic assumption
could itself be exploited via social engineering of the ideological mindset
and thus the very viewpoint is as insecure as the codebase is made to be:
1/N/0 <-- pT/T.code <-- 'binary/paradoxial-reasoning'
There could be a massive deception hidden within this context, not only of
the binarists who exploit broken crypto to surveil and steal from others,
including the state itself, though have no indication of anomaly allowing
their mirror-looking to see the other side of the one-way view, thus other
encryption alongside yet invisible, additional 'truth' inside or outside
binary models of 'pseudo-truth' yet unable to be reasoned, pattern matched
and instead thrown out as errors, ignored. superposition of truth, its
contingence on observation and how logic effects what can be reasoned to
exist. and this is where /programming/ essentially is a form of reasoning
and yet 'the debate' is not occurring at the level of language in words and
viewpoints of people- in that this level of [code] is needed to
communicate and model ideas within society, to align with conceptual
structures like programmers must to attain functionality of developed
intermechanisms and yet at the level of individual and group discourse this
system of relation and communication is broken within institutions,
schools, and society, such that only a binary viewpoint is allowed and
proceeds and is rewarded yet at a cost to civilization and life itself, due
to the servitude to enforced stupidity.
instead, the ability to comprehend this situation of communication as
[code] is needed firstly to be able to think and evaluate accurately, to
use language and mathematics in a meaningful grounded way, and not
arbitrary or mindlessly reproducing copies of copies of ideas that are now
ideologies, adding more and more noise and losing the original truth or
signal that instead is no longer accurate because the context is changed
and it needs to be reevaluated as model, yet everyone appears ILLITERATE
else unwilling and unable to do this, because they have more important
things to do like wax their egos or manicure their stellar lifestyles.
in other words, in some fundamental sense: programming is logical reasoning
and tools could be made to develop these skills via the distributed net of
mobile platforms that would help people learn how to think, how to evaluate
situations in empirical frameworks, help understand probability, looping
hypotheses, binary limits and issues of absolutism that are unreal in the
ordinary sense (too simple, thus dumb and inculcating ignorance via
viewpoint), and provide platforms to link thoughts and ideas and concepts
in structural frameworks as a new foundation for the next internet as a
shared POV and organization of data that is meaningful and has purpose
beyond private views and agendas, and limits of copyright for truth, etc.
so the relation of "logical reasoning" with [language] and [mathematics] in
terms of concepts, ideas, algorithms, models, yet also "programming" of
this CODE that may remain or be sustained by cryptographic means and
methods in terms of deep culture and the sustaining of literacy beyond the
ordinary mainstream boundaries, its metaphysical dimensions and source.
in this, the role of cryptography perhaps at the unifying juncture of the
two cultures as they are reunited in [code] and establish LITERACY across
the total domain, moving from esoteric to revealed knowledge and awareness.
the philosophical dimension, context, and goals of programming and role of
debate and protection and extension of freedom of ideas and language within
the era of computer development lost to social engineering via technology,
its tools and platforms to promote this ignorance, falsehood, functioning
against truth and shared awareness, against ideas, feedback, democracy. the
ideology too small for the ideas, the ideas to large for the logic, and in
turn the corruption replacing insight with ego, as the basis for exchange
in a shallow hollow realm of exchange and relation fundamentally antihuman.
*key is whether the observer is aware of their own observation, their own
code, and can correct and account for errors or relies upon them for
observation. can the observer observe themselves or do they realize their
observations are observed by others, which is a basis for objective views
in that many views of the same event can help error correct for distortion
or unknowns yet if all assume the same views, these are reinforced instead.
--- ye ol crypto system ---
to the tangible future of a human managed society and state based on shared
truth-- it would be possible to transform the issues of today into a new
context and capture the /truth/ that exists buried within the complexity
overlapping agendas, human and inhuman, and align the activities of the
public and private state in accordance with human needs and goals. such as
with a new digital monetary system and taxes, and education that teaches
citizens how to think via logical reasoning, to raise consciousness and
capacity through learning and developing skills, towards optimal and
highest functioning - and to realign goals of bureaucracy to serve the
citizens instead of function against them, such as regularity agencies that
establish a framework to reclaim a healthy non-toxic environment and return
areas of wilderness to their natural state, such as removal of vast areas
of sprawl and reimagine city planning and transportation systems and other
approaches to human development in a more efficient, effective, humane and
livable approach.
the issue of these marketing firms and advertisers collecting vast data for
sale on any citizens is in parallel to state surveillance issues and could
be legally abolished as a practice, with limits to what can be collected
and requiring a citizen to allow such tracking for market research and
nothing beyond this. that would be legally enforced and corrupt systems
that surveil as business models would be taken down, go out of business due
to the illegality of a massive private surveillance regime due to code
exploits of constitutional errors, allowing private businesses to profit on
public extortion, expropriation, devaluing of name and identity, stealing
of information, and various other forms of theft, fraud, schemes for the
blacklisting and framing or intimidation of others via such practices,
especially and particularly in a political and ideological context, where
your local business is tallying your presence here and there and gaining
profit off such data as a business model, reinforcing the tyranny. there
is no place for this lawlessness, this bullying and intimation within a
'free' society unless it is no longer beholden to its constitutional
framework and there is nothing to protect citizens from the exploitation of
their data.
it is not an issue of regulating it-- it needs to be abolished.
in contrast, state surveillance is potentially somewhat a windfall for a
future society where electronic health records, dental, taxes, billing,
taxes, income, work history, education documents, and other dossiers could
become a repository for citizen data that they should be legally allowed to
access -- based on transparency and within limits of security models in
terms of actual secrecy and security issues it may involve. such that you
probably would not have access to FBI or CIA assessments though should
rightfully have everything else, and it should be *accurate* data and not
full of lies, distortions, false perspectives-- and this needs to be the
right of every citizen to have accurate data profiles (A=A) and not full of
documents that distort information to onesided views based on corrupted and
self-serving authority or political agendas.
so here's the idea- and the critical role of cryptography in this...
basically these federal and state databases can become future 'electronic
records' for citizens, so that all dada is stored in a shared accessible
model and can be accessed from anywhere via the network, such that schools
can send data to those files and logins can allow shared access for those
whose files they are. then, for instance, if the government has a issue
such as social security, all the data is in one place and the reference
information is available from multiple locations, not duplication or
triplication or quadrupling of efforts or reliance on postal mail, paper
and stamps and delivery networks to get snail mail validation. ZONING would
be the primary structural issue, what are the perspectives for the combined
total database, say federal and state, though also health education work
taxes and onward, though an entire life could be stored in the model, from
childhood to old age. and yet these could be more than documents, it could
also involve a concept of a citizen, a model or 'individual circuit' that
they develop for their goals in life and their circumstance, issue and
skills unique them, and through this empirical context and grounding,
everyone including teachers and family and doctors and the state could
access this data model as it relates to the individual conceptualization,
their direction of development, and map lives into and onto and through
this data modeling as a model of education, health, career, citizenry.
to do this would require shared keys, and an infrastructure reliant on both
security and secrecy in varying scenarios, depending on the exchange, and
to what degree the data is made accessible. for instance a doctor visit
could have the medical records opened for a one-week window for updates via
key exchange, or an educational institution may hold keys for each student
that updates their coursework yearly or by semester yet otherwise is closed
down and secured in the state model, under watchful eye, protected. this
too could occur with monetary exchange accessed through a substructure so
employers payroll is automatically figured, and micro-taxation that could
be automatic to currency could be tabulated and tallied and recorded in
this central location and instead of taking money out and then returning it
later, avoiding this lunacy for a just-in-time model where money accounts
for its own existence and has identity yet does not create friction that
prevents monetary relations or exchange, allowing money its fluidic power.
the individual citizen then could be given a crypto key that is somehow
attached to an object, equivalent in some way to a social security card
with specific ID number, yet with an authentication scheme based on a
single unique entanglement (assuming classical quantum infrastructure is
out in the open) and thus the key has unique physical bits that ensure
specific entanglements with other paired bits elsewhere, that could be
connected to this central database of state. and from that, entangled
further into a physically-based model of crypto, additional crypto keys
that coexist in that domain within infinity-models, that generate the
everyday keys for accessing bank or school records or circuit diagrams of
the self as a life plan, the society actively involved and supporting
development of itself in a shared framework of relations and exchange,
ideas and intention, purpose and possibility for human civilization.
in other words, a person would carry a device that would be a keychain and
have many active keys that are validated by an underlying state key that
generates these others via physical hardware entanglement, perhaps a
qbit-blackbox or something on a smartcard, yet its detachment from the
person also could invalidate the key as it is a unique one-time correlation
and thus to forge it would collapse the entanglement, and other monitoring
would track occurrences to prevent outside manipulations via biometric or
other verification of identity. speculative, most entirely unknown though
seemingly feasible in the abstract, where the physical key of door/lock is
updated into a future realm of entangled crypto keys as citizen ID, that
then is a validation/verification system for establishing remote trust for
other subsystem crypto exchange via related or embedded key systems that
could be added to the keychain. perhaps the quantum key resides within a
home and only activates the other keys yet need not be carried around once
activating them, and thus provides a physical security barrier or air gap
that could bound any attack into the larger network or database system by
whatever local key is accessed illegally, thus establishing perimeter
defenses or other protocols to diagnose or act on the anomalous events.
it is questionable if such a keychain or crypto key system would involve
tracking by default, if not just in a data model given that the state may
have access to this information if needed, and thus in an emergency it may
change 'zone' settings, open up the cell network, track a person down and
ring their phone to let them know of a connected event via automated call,
or other such functionality, though otherwise data could be anonymized and
sensor networks and others would only focus on actual threats versus
dragnet the entire citizenry under hypersurveillence atmosphere where the
entire society is criminalized and made passive via fear of state violence
and retaliation for speaking differently or going against political party
line, which is the daily situation in its economic, social, political
context as engineered by the binary ideologists to exploit as is.
in this way, crypto keys could differentiate zones of public from private
and there could be state secured databases protected by law, whereby like a
safe deposit box, information could be stored or this could be linked
within the home as well, decentralized, though in some sense 'security' and
'secrecy' of a private nature could be protected via these lawful resources
that would only under extraordinary measures be accessible by the state,
under oversight, and monitored to ensure they are protected by government.
for instance, someone may want photos of their granddaughter to be passed
on to her after the grandparents pass, and she has children, and such
documents could be stored in such a place, as data files. maybe that is not
the idea of others, though it is in contrast to the 'fear the state' model
if it were to exist in a context of human values, where these rights and
principles and ideas are protected, then the database could be citadel, a
protected zone that will continue even if the house burns down or a parent
dies and that data can be accessed and it is part of the process of life
within a context of electronic information and data resources like these.
the larger aspect is that such a tiered crypto system then could involve
house keys, vehicle keys (for eventual antigravity landspeeders i hope),
'money keys' (access to currency, currency as information), state database
keys (subset: health, education, career, psychology, etc). etc.
the crypto infrastructure would be vital to establishing, sustaining, and
securing and protecting the state and its citizenry, in addition to its
role in secret communication which may take on other parameters in such a
'shared identity' context, whereas other realms could involve unshared
identity and involve tactical, strategic, operational crypto for other
environments and situations or tied into this as an infrastructure layer.
say, if you're dealing with hostile robots who steal children or swap out
citizens and they need to be hunted down and eliminated, and so on.
parallel to this, hopefully the end of wi-fi will appear, the pollution of
the environment via electromagnetic radiation and interference with the
senses and nature, and regain what has been lost by toxic invisible skies
continuing that terrible tradition of the first industrial revolutions,
once citizens become literate that the technology is harming citizenry by
unregulated design and this relates to cancer and other issues, including
nefarious agendas to engineer illness, obesity, to devolve the society.
those codes can be broken, dismantled, revealed for the abuses of power
they involve and the antihuman agenda that the unconstitutional state is
allowing to exist, terrorizing citizens as its basis for legitimacy. the
true terror today is the unlawful illegal unconstitutional state today. its
code is error-ridden, its ideology is completely unsound, and it is time it
is accounted for and error-corrected at the scale required to change its
circuitry and given humanity the chance it deserves to succeed in this
life. if ever there has been a reason to fight, this is it.
1
0
Dropbox is pulling a Skype.
----- Forwarded message from Joe Szilagyi <szilagyi(a)gmail.com> -----
Date: Thu, 12 Sep 2013 08:42:17 -0700
From: Joe Szilagyi <szilagyi(a)gmail.com>
To: liberationtech(a)lists.stanford.edu
Subject: [liberationtech] Is Dropbox opening uploaded documents?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
Reply-To: liberationtech <liberationtech(a)lists.stanford.edu>
Found online:
http://www.wncinfosec.com/dropbox-opening-my-docs/
--
Joe Szilagyi
--
Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys(a)stanford.edu.
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
6
5
https://www.muckrock.com/foi/united-states-of-america-10/vupen-contracts-wi…
https://muckrock.s3.amazonaws.com/foia_files/9-11-13_MR6593_RES.pdf
FOIA by @ramdac
Not a massive surprise, but interesting to see it in writing. Looks like
this is for the standard subscription, not custom development. Although,
the cost is redacted. Chaouki Bekrar is also mentioned by name.
—————————————
Rich Jones
*
OpenWatch <https://openwatch.net>* is a global citizen news network.
Download OpenWatch for
iOS<https://itunes.apple.com/us/app/openwatch-social-muckraking/id642680756?ls=…>and
for
Android<https://play.google.com/store/apps/details?id=org.ale.openwatch&hl=en>
!
1
0
disclaimer: if doing this is illegal then the alphabet is illegal and
'ideas' themselves have been criminalized by the terror state
--- (continuing...) ---
hint for previous code: _ |v JL 3 p\ w Z 7r : 2 6
perhaps should have made the last character (6) this instead: O J
the idea then of a digraph substitution: JL = inverted T, etc.
Thus, for instance if someone has a perceptual bias and is only looking at
single characters as single units, the diagraph, trigraph, etc approach
would be beyond their threshold of observation, beyond the perceptual
modeling and thus such bias or limitation in interpretation can allow other
information to exist beyond how it is perceived to exist by a given
observer, unless they figure it out- so it would involve rules or learning
how to determine what schemes are active or not, multiple or none
further, the idea of a search of the original string as anagram or other
approach, such that the breakage of units into fragments or components or
elements thus can defeat brute force meaning unless checking all variables
which would tend towards infinity, via probability. thus the secret is in
some sense the noise, the more it is looked for the more possibilities
arise and fill in the void with additional meaning that may or may not be
active -- whether intended or not, which is the spooky aspect of this, if
systems or data is somehow entangled whether as information and-or
objects; seemingly /metaphysical keys/ even.
so a hypothetical example would be, putting the original 15 characters into
a structural search in which the original concept cannot be located in the
analytical results (in ordinary terms, the 'word' does not exist within the
letters/numbers themselves) and in this way, while it was was the basis for
creating the 'string' (bit set), it may not be active in its interpretation
or its activeness may exist in the permutated results and thus not require
a decode by the receiver if already having the key because they know the
shared reference yet the structure exists as infrastructure- and it may or
may not have relevance though it could be mapped into that structure as if
a conceptual root structure that could have calculative or geometric
aspects- meaning, there could be many simultaneous structures some related
and others not, that may or may not be activated in particular signaling,
perhaps similar to neurons and synaptic structures in the brain that fire
together yet whyso remains a mystery due to the limits of observation and
an accurate model for analysis at the level of activity being observed-
thus phrenology or scrying in an ungrounded sense providing security by
enhancing warped, skewed, biased, limited interpretations, erecting walls
and false rationales by "relativistic frameworks" in a realm of halls of
mirrors within halls of mirrors. distortion by unknowing autogenerated, and
in some sense 'signal' can be masked as noise also, shell games within the
parallelism of infinity and the computational limits of parsing those
dynamics accurately, which could easily exist beyond technological means
thus also in the realm of literacy, 'reading the signs' or abstract
markings can become the limit between those intelligent and those smart yet
illiterate and not in service to the conceptual foundation involved, and
their perceptual frameworks can be used to construct false perspectives
that become labyrinths to control future options, yet while creating the
illusion of being in a 'shared awareness' or framework (partial) whereby
pseudo-truth, its reliance on error, can allow extra-dynamics to exist
while also coexisting within 'some truth' of the shared condition; perhaps
this is zoning within a threat containment model, or subversive takedown
approach, establishing booby-traps and trap-doors and pyramid defenses
so, a letter or number could be de|con-structed and words or concepts or
meaning could also be tokenized by a substitute system of relation which is
what symbolism also allows, a type of exchange existing with a symbol and
its network of conceptual structures aligned with it, an infrastructure of
shared meaning and dynamics that also has myth and magic and spiritual
dimensions as a potential, these tending towards darkness and light yet
also accounted for in a shared universe (U), this richness and depth then
perhaps closest to the forces involved and their dynamics, versus its
caricaturization that presents its substance mainly in cartoon terms, a
popular culture framework as if yet another commoditized ideology, thus the
assumption of surface-relations versus actual depth and core functioning
--- sidenote: after the expansion ---
it should be added that after a 'string' is permutated, say it goes from 15
characters into a million character / word combination space, that is in a
precisely bounded model that defines the perimeters and parameters of its
expansion and analysis frameworks (if not via infrastructure standards),
that it would seem this is a one-way calculation and as impossible as it
may be to find something inside the expanded set combinations, it would
appear even more impossible (exponentially) to try to put it back into the
original pandoric gift package, the originating /bit set/ even if knowing
the rules and trying to apply them in reverse, to go from 'many' words to
only a 'key string' as exampled here (said: bit set now, as a description
of the set relations between characters, not linear string if it is
"calculated" and worked-out in its probabilistic interrelations).
in other words, could you go from one million characters and various word
combinations back to the original 15 characters- and my presumption is no,
it would be even more highly variable in reverse if computed this way, in
that substitutions could occur at some point that introduce (noise) extra
data, such as a S=5 and starts to shift meaning out of the original
context, and so many of these shifts could occur, 'recenterings' as part of
analysis, that if not having them in their entirety and evaluating a
massive set, even if having the majority correct, that small area of error
could continually expand as noise and veer interpretations off course and
bound the backwards analysis- which could be useful if having a code that
generates something yet cannot be worked back, yet still is linked to it or
exists within the unpackaged expansion as an entangled conceptual order,
which again may or may not be activated- say like streetlights turning on
at certain hours, or animal migrations under certain conditions- the data
may appear momentarily or in a given context and then be absent the next
so in this way a 'noisefield' could be inherent in the expansion and
messages could be hidden within it, perhaps even texts or documentation,
that would be reliant on the originating bit set yet disconnected from it
if not available to analyze, yet it may also have carry any signal or
secrets when analysed, such that it is feasibly arbitrary, one of many
frameworks, and unless knowing what the perspective is, it could be a false
corridor and lead to *answers* that are inaccurate or 'counter' to the
actual view yet expand into another parallel stage-set universe (U2) based
on error-reliant pseudo-truth believed to be accurate yet moving further
into falsity (pT-> A=B). in this way, paradox is the limit, as if logical
reasoning and 'shared observation' and if identity is unshared, fiction out
of what can be shared facts in a limited model based on other rationales,
thus exploiting bias and other false assumptions and their structures
perhaps a way of conveying this is those with a human POV versus antihuman
perspective and how consciousness would be correlated differently both in
observations and interrelations, especially with doubling or imposters
for instance someone may perceive a human as 'racist' for an observation
because of a potential interpretation that is a particular framework thus
bounded reasoning to that viewpoint structure, whereby: humans {ethnicity}
in terms of sets, different skin tones and cultures could be secondary to
being a human being and thus 'human' would be the superset...
human {ethnicity} or
human {race}
This versus the opposite, determining interpretations locally as if the
main basis for primary awareness:
race {humanity} or
race {ethnicity}
In other words, subset {set} if not: subset {superset}, can take on the
interpretative 'universal view' (U) and it may have 'some truth' in a
certain relative framework yet it may not be the larger or overriding truth
of the observation and this ambiguity needs to be taken into account. say
with my previous instance of a 'song here song there, here a song there a
song, everywhere a song-song' as it may be viewed instead of a common
rhyme instead a device to channel bias about 'yellow people' as if the
intent. note also several such devices were used, not indicating this
viewpoint.
it is to say that multiple readings can co-exist, and there can be some
partial truth (whatever truth exists is true) yet it may not be the total
or overriding truth or even generative truth and instead exist as anomaly
or entangled instance that arises out of noise, as with a crystal ball that
takes in outside patterns and merges them into a common spheric surface.
i think when i wrote that i noticed the potential ambiguity yet the idea
was not that and decided to keep typing versus try to edit and invent
another device for an ongoing theme (about endless communication in terms
of 'linear string' assumptions as if automatically meaningful versus hollow
and how a lot of people can be singing and saying *nothing* in terms of how
it adds up empirically, versus fragmented relativisms which are basically
noise allowing the cultural degradation to continue under that mirage of
depth and hand-holding feel good hedonism, as if it is all that simple).
though counter to this, it is true that certain cultures have names that
align with 'song song' and thus it could be associated with that, even
though that was not the interpretive framework and it could have meaning,
whether or not true or accurate in the specific context, what is true is
true. and thus if a military strategy and its associated ideology involves
emigrating vast populations into other areas in order to subvert them, and
then holds up a politically correct boundary saying it is discrimination to
speak about what is going on in those terms- it probably is going to cause
collisions in discourses like these, where such dynamics are mediated
outside the "official silence" and politics of the everyday societies.
again, humans and antihumans would be my response to this, and humans are
in every culture and activity. and so they are in the superset and not
viewed as 'subset'- though an antihuman ideology that tries to stop such
analysis of human awareness via censoring debate or activities then is
seeking to overpower and bias interpretation via unshared identity that is
privileged and beyond error-checking or correction, thus requiring and
demanding a safe zone of *secure interpretation* that prevents accounting
for these dynamics via peer pressure, etc. essentially:
antihuman {humanity}
as this is institutionalized, effectively:
subset {superset}
if you give any credence to the higher cosmic order involved in this, such
that the earth today is being governed by 'the lower' to which to higher
functioning have had to adapt to allow the takeover and takedown to occur.
Most excellent in terms of this cross- and intercultural dynamics is the
work and ideas of Edward T. Hall, especially in terms of language and
cultural systems, how signs are interpreted differently yet also in this
variance the richness of truth beyond limited observations of a given view.
here is the ~50 words for snow in eskimo and so on, as it relates to this
same bit set issue of where someone is interpreting the data from.
another possible way of conveying the approximate idea:
(humans {ethnicity}) <--> (antihumans {race})
what matters is truth, who serves it and to what extent it is recognized or
subverted for another agenda than the shared set, its values, goals, and
principles- and this aligns also with coherence and its limits in ideology
versus ideas, rigid limits to allowed thought versus freedom and liberty
and serve to life or its annihilation by rules to prop up false universes,
and the larger context for this being cosmic accountability and the role of
crypto and both sides of these issues- that complex /ground/ of operations
that could be binary or paradoxical, actually grounded or only virtually...
so this gets to a basic idea of 'code' -- what do you trust? -- do you
trust some cryptographic standard, do you trust a person or system or
machine, do you trust 'ideas' without having parsed them completely and
thus rely on 'unknown knowns' determined by others, perhaps of unshared
identity and thus exploits-
and to me it has become self-evident that only TRUTH can be trusted, that
it is the basis for trust, and in combination with logical reasoning allows
this trust to be evaluated and accounted for, and anything less is
potentially an issue of 'trusting signs' in its place, mimicry or facades
or ungrounded connections or relations, such that 'signs of friendship' can
substitute for actual friendship, and other types of programmatic
techniques whereby truth is not shared as the basis for interactions, and
this occurs within 'shallow language' and 'wrong assumptions that are
carried onward' within the scaffolding of viewpoints, /errors/ normalized,
that devalue and degrade truth- yet become structures for *TRUST* within
computing and social systems, again the Binary Crypto Regime as ideology
the peak of this institutionalized untrustworthiness made into religion.
Faith in crooked code, crooked administration, crooked relations, crooked
ideas, and accounting in truth and via logical reasoning nowhere found
outside the *protected limits*, thus allowing the antihuman agenda to
proceed friction-free in fallen environments that serve this 'mastery'.
if you trust in people, it is within their truth, the truth of a person not
their falsity or pseudo-truth (unless mistaken) -- it is a critical
distinction and of wide-ranging consequence. so too, ideas- the truth of
ideas versus their approximations and warping and skew and distortion and
biasing- to defend and uphold that is a corruption, a compromise that is a
degradation and deteriorates whatever truth exists- thus, compromised code
as if secure also compromises the person wrongly believing its integrity
without being able to evaluate it in truth themselves or relying on others
who are untrusted or of unshared identity to guarantee ideas through trust
of technology or 'trust me' models- which if 'shared awareness' is not the
same or exploited, leads to exploits. whole OS platforms built upon this
and similarly exploited, though in a realm of double/triple schemes, etc.
so FAITH in TRUTH and in the truth of people and in the truth of ideas, yet
accounting for this truth, understanding it, being able to grapple with it
versus make and build assumption upon unreliant assumption that could be
built upon a threshold exploit (unknown unknowns) that bound interpretation
and yet another could be decrypting everything from the start because it is
built that way- just not understood by the users- thus 'trust the
algorithm' without dealing with 1:1 truth allows the A:B exploit its
tyrannical freedom to overlord and invisible hand events onesided. for
instance, if time travel there is a high likelihood the present day would
be governed from the future context and its administration over the
present and taking this into account would be one approach and ignoring it
another and thus 'standing lies' could be seen as part of that SCIFI
framework in that actions do not add up in normal terms in day to day
policy and why is it that situations are being run off the cliff regularly
in parallel if not some 'beyond mainstream' policy decisions making sense
of shared madness
so if the truth of ideas is not dealt with, and the truth of people and the
truth of machines and technology, and the truth of code itself, and not
using actual *logic* beyond the binary evaluation, how much truth is there
really in these systems and relations by default of ignoring the reality,
and how much of the surreality that exists is based on the shared FALSE
framework that allows the oppression and oppressors their advantage... thus
the role of the logic bomb in taking down the kernel of the corrupt belief
that sustains the lie and the code that stands in truth truth as its sign
yet ungrounded, an entire standing empire built upon a too simple ideology-
now that is a security nightmare waiting to happen, for those on the inside
and with vested interest in seeing that it and their lifestyle continues,
say versus feedback from the oppressed and exploited... payback time.
--- more on bit set dynamics ---
here are some additional examples of various approaches; you could use
numbers in place of letters or vice versa, perhaps co-existing and thus to
flip and unflip sets...
A B X
1 2 24
Such that A is the first letter of the alphabet, B is second, and X is
twenty-forth. it could be taken further and sent back into letters by a
second pass:
1 2 2 4
A B B D
Optionally, from these same numbers it could instead be reformatted in that
the original 1 2 24 could become:
12 24
L X
Another approach could involve flipping the bit set characters prior to or
after expanded into massive constellations of data of the interiority, and
thus layers of overlapping interpretation could exist from the start which
could be part of the symbolic algorithm as it were:
h i o x / x o ! y
there is a potentiality involved that could result in different expansions
and keyspaces and so it is an issue of what these are and how they could be
determined or shared- perhaps in the bit sets themselves or other keys or
it could be arbitrary and truly crystal ball 'seers' in given instances,
altered states that may align or be shared or unshared yet deliver info
also: this could occur without software in a massive distributed model yet
with software tools it could be something more in-line with crypto systems
of today and massive computation that probably could find ways to encode
and embed programs or documents via such techniques versus SMS equivalent
peer networking. say for instance the following bit set were evaluated:
U SI 20 1LL 2Z O X LS
Perhaps it expands into a thousand character document, and that 'X' symbol
were notation that it should be twisted 45% and read at an angle, dropping
out certain symbols as noise and others would be retained by symmetry or
having multiple readings (say: N S Z in terms of rotation & reflection). In
terms of the mirroring of language, reading upside is a useful skill or
being able to have /superposition/ of alphanumbers and those substitutions
in mind and parsed in real-time evaluation- perhaps relevant, perhaps not.
yet a computer system could likely mine such data very effectively given
rules and decipher or encipher and puzzle data back into jack-in-the-boxes
that could be reused as structure, or so it is hypothesized
continuing with approaches, there is a certain interesting correlation with
certain letters and logic notation, such as p q p d that in their relations
demonstrate mirroring and so this is part of the structural of numbers and
letters that can indicate function or have distinct features as if puzzle
pieces that can and cannot fit together in given parameters of co-alignment
p q p d
b d b q
The ambiguity of this, yet also other options...
b = |> <| = d etc.
perhaps even |> / as a trigraph as 'twist b, thus q'. yet any of this could
also be compressed or have multiple meanings depending on perspective and
the framework/s for evaluation.
the corollary to this is potentially sequencing of data structures though
again -- not linearly. multilinearly, nonlinearly, as permutative sets, the
total ecology of combined and related dynamics, CERN-level and weather
forecast modeling intensities... and still there may be infinite unknowns
even within the structural data if not having the keys to unlock it
another foundation aspect of this is character overlap and subtractions and
additions via their combined state; it is very difficult to convey without
images because it can be high resolution in a standardized context (16
segment display, square UNION JACK symbol of the ancient mastercode, HIOX).
and it is logic dependent in certain instances to figure out... first hint:
b 8 d
The numeral '8' essentially can be a character in /superposition/ whereby
while the 7-segment is the seeming source for hexadecimal letters, it has a
potential substitution of: A, B, C, D, E, F, H, J, L, O, P, S, U.
Thus the words: bad, bed, bod, bud, in addition to other acronyms could be
seen as a potential, held within the shared overlapping structure of 8. it
is thus a *wildcard* bit, in terms of alphanumerics. The HIOX or union jack
symbol is 26 letters + 10 numbers for a single bit, by comparison. so
imagine the set evaluation of: b88d, in terms of including the hidden 13
other letters and how this may influence anagrams or other permutation
combinations.
In a similar way, you could have a letter 'm' and break it into two letters
'n' or invert them, 'vv' which could be mirroring 'm' or 'w'. or turned
sideways and becoming 3 or E, that is, M or W. or c & c in a given view,
depending on the construct. consider another approach to overlap:
3
E
= 8
And further, into the larger alphabet...
R
L
= 8
This approach would include retaining the overlapping elements, thus
additive, whereas if subtractive- combining the number zero (O) sans null
slash (0) and capital letter i (I) assumed having full upper and lower bars
at top and bottom of vertical, would equate to an: equal always equal
symbol, orientated vertically. what is dissimilar is retained. this
abstraction in part required by the tools, unable to communicate most basic
information for lack of standard formating and basic display of 'code' as
it actually exists and is used. example of subtractive:
R
L
= 3
Perhaps this aspect of superposition is closer to that of /spin/ for
certain character features, whereas for a large capacity symbol such as '8'
or HIOX it is a much more vast range of set potentials to unpack via these
interrelational dynamics.
--- messing with HASH ---
it is still unknown if the parallel structure of a bit set as the string is
comprehended, such that [xyz] could function as a string yet also co-exist
in parallelism as [x|y|z] via set recombinations and expansions. [x] could
be anything, say 'the internet', [y] could be pi/1.666 and [z] letters A-H.
likewise, [x] could be symbol 1, say a purple dinosaur, [y] could be '8'
and [z] could be symbol 2. the slot machine really is vastly variable and
could involve multiply turning bounded infinities that tally in custom
circuits (outerlimits of enigma), and the 'string' could also be infinite,
such that both the bits and bit set could move towards infinity, such that:
[infinity^1][infinity^2][infinity^3]...[infinity^N]
how could any machine possibly rationalize all of that? impossible. and
what if most of it is *noise*. it leads to interesting conditions for ideas
and algorithms, new territories perhaps, places without any maps or
infrastructure within existing _known technology. randomness, yessir.
like the Moholy-Nagy painting (ref.typo error) in a previous post, there
could be calculative dimensions involved in ordinary language, through its
transmutation and reimagining in its 'other variability'. imagine colliding
[hash 1] vs. [hash 2] and arriving at some kind of structuring... what if
it is the same 'bit set' that is collided with itself, yet transformed
from bit set A to bit set A'. thus A x A' = new bit set
u x w h ==> y m x u == ? ? ? ?
Thus it would matter if it is additive or subtractive for what the new bit
set would be and what would be expanded in terms of its interiority.
so what if the english alphabet is 26 letters, A-M/N-Z and you run half of
these against the other, what kind of structures result. and what if you
take half of the alphabet and mirror it above itself then add/substract or
flip, or recombine in various ways, or two-letter sets, adjacent and
non-adjacent-- suddenly it is off the map, unexplored symbolic territory
perhaps, and that is seemingly something else entirely in terms of meaning;
and for the naive like myself, how might this relate to various encoding
schemes that use character sets and symbols for data transmission, are they
substitutable or could they even function as a deep data code (signage
going into and through data instead of only across as linear strings), and
what kind of access/entry and egress and circulation may this allow, open
up or prevent in terms of traditional data models and also processing. it
would seem in some way related to a compass with magnetic north and true
north, though that could be widely variant and easily polarity could be
lost and someone could be heading south or 'up' or 'down' without knowing
it, in flatland terms of bounded interdimensionality
also, language translation, western european languages, umlauts and other
details related to extra-textual cues or clues perhaps
venezia & venice
what would the different keyspaces expand into if only some of the
structure is shared, yet the idea is essentially identical, such that the
signage maps onto the same concept, empirically, via translation-- is it an
issue of distortion, cultural frameworks of language that format structures
and how might these be bridged or is it a limitation to the model, thus can
bit set dynamics occur only in A:A frameworks or can A1:A2 also function to
a threshold limit, until A:B is reached, or may it also function at A=B,
insofar as the structure of A is retained within the structure of B:
A <---> B{A}
and further, consider if the 'translation' was a particle collision and
thus the probing of molecular structuring shared and unshared between the
two concepts, attaining higher resolution of their shared dynamics via
interrogating their relations, grounding and mapping and testing of
assumptions into a common empirical framework- as if language is the basis
for conceptual infrastructure
--- note on correlations ---
having written about this elsewhere and forgotten a specific clarification,
pattern recognition itself is about this sign=sign matching, yet assumes
that the match itself equals truth and this is not the case, it is a faulty
assumption and an ideology that the truth of language is in the sign itself
and not what it is referencing. thus an apple would be the word apple
versus an apple itself and the 'idea' of what an apple is, its potential
superposition of meaning. this is the binary plague of ideas everywhere
evident in technology-- the potential of technology now making toys for
adolescent adults based on limited viewpoints, goals, and shared purpose.
mathematics begins with patterns. understanding and deciphering them.
yet it is this recognition that must occur in a A=A framework for it to be
actually true (1), and thus the refinement of ideas and removing falsity
from pseudo-truth and using hypotheses prior to declaring theories, as is
the empirical methodology. and so TRUTH is foundational to mathematics,
knowing what is true from what is false, and relating this to an A=A and
A=B evaluative context, which is Plato/Aristotle and others of course.
and yet if a mathematician arrives at an equation, or a person proposes a
universal idea, it is not just that they have found a "pattern" that seems
to fit, it is that it must correlate with other structures and patterns in
their known integrity, that is "truth". so there is a relation in truth for
the evaluation of truth. (thus: binary assumption of truth extends all the
way to all subsequent assumptions based upon it).
so testing hypotheses and ideas and equations and finding flaws is the
vital process and obligation of error-correction and refinement and the
changing of the model or hypothesis or pattern conceptualization so as to
better align with what is known to be true, verifiably so (1=1) versus
relaying on something know false and relying on its structure (1=0) for
further such 'ideas' and 'equations' as an error-based structure and
viewpoint, which can get religious even, and is hugely invested in the
ideological, where questions have long ago been answered and unasked since
even when facts and evidence refute the claims. thus limits, boundaries
allow even faulty pattern-recognition to persist by keeping out
error-correcting observations. and 'empirical' observation is thus limited
to only those facts and views that support the claims, ideas, equations.
this is why logic is so critical to determining and accounting for truth
and evaluating 'structures' that supposedly carry its /momentums/. the
trusswork of ideology that may be corroded to such a degree to collapse yet
carry the weight of a society, these areas of weakness offlimits for any
interpretation, protected by retaliatory violence to allow virtualized
viewpoint to continue, while endangering all who rely upon the error-rate.
the 'binary logic' that is falsely absolute yet unaccounted for can thus
"exist" in a bubble civilization yet only through dictatorial tyranny that
is against its evaluation, most especially in logical terms, these also
being the most self-evident and only way to actually describe what is
occurring as it occurs conceptually, structurally. everyone knows, yet the
'reasoning' itself is made off-limits and thus the incapacity to say for
lack of a way of accurately 'recognizing' and accounting for the events.
in this way a [sign] could be interpreted one way by a binarist and another
by an observer of 3-value or N-value paradoxical logic. the pattern that is
encountered may appear identical yet its mapping into structural frameworks
of truth could be entirely different, and more accurate than another.
so it is an issue of intelligence, how these signs are interpreted, and in
a more general sense [patterns]. and thus C.P. Snow and the Two Cultures
allows consideration of the mathematical evaluation versus linguistic, or
'literature' as a basis for this interpretation, leading to numbers and
equations in the former and alphabets and writing in the latter. though
perhaps with mathesis that division related to pattern recognition is of a
previous era, and instead 'literacy' has moved closer whereby concepts of
"programming" (ala Lewis Mumford) have "symbolic processing" as a skill
that present-day once future populations were predicted to need to survive
symbolic processing ===> [patterns] (signs & symbols)
thus, patterns could involve both mathematics and language, equations and
words, and some overlap could occur or exist as it relates to the nature of
thinking itself-- such that, while 'binary' views may be easily taken on as
a quick route to decision-making, looping probabalistic reasoning via
multiple hypotheses autonomic and conscious are the ways the nervous system
and brain actually work, in a context of navigating absolute truth and
falsity, including constantly refining and add and querying data against
contingent models and not simply discarded what is unlike thus 'false'.
in this way, an approach to thinking that is ungrounded in experience and
natural observation itself can become religious dictate via indoctrinating
people into an inaccurate framework and basis for shared awareness and
relations that are A=B in terms of pattern recognition, customizing POVs to
a warped, skewed pseudotruth that tends to zero, as a compass and guide.
The kernel is wrong, faulty, yet cannot be error corrected, power says,
government enforces, institutions crushing the facts, observers, denying
and censoring and outlawing illegal patterns, universal perspective.
Thus there is truth and falsity where A=A and A=/=B reside, and this is the
basis for establishing logic. that is, A=A is the pattern match, and A=B is
the false match, the errored idea.
T/F <--> logic
And depending on the 'logic' used for evaluation, that will then influence
what is and can be observed, such that:
T/F <--> {binary|paradoxical}
T/F <--> binary --> 1/0
T/F <--> paradox --> 1/N/0
such that, the logic then influences the observed patterning:
T/F <--> logic <--> [patterns]
In this situation 'code' could be the patterns that are assumed true and
accurate for sake of being operational in a binary framework, whereas with
a paradoxical evaluation this truth is not presupposed, instead questioned
because it is and always remains contingent- a hypothesis that requires
testing, challenging, verification, validation and continual error-
correction-- else, via entropy itself, the inherent fallibility of partial
observers within limited frameworks would be taken as if truth itself,
absolute, even though inaccurate, faulty, by lack of godlike omniscience.
logical reasoning is what this testing and error correction are all about
yet if it occurs in a binary framework the observational bias continues to
see itself as 'correct', infallible observers because they can equate the
sign they believe is something with the thing itself apple is the word and
not the larger external reference- and thus 'signage' stands in for and
begins to mediate truth irrespective of its external validation, within a
false empire of signs and symbols-- mathematics and language that becomes
and is detached from reality, its own virtual word of anything goes...
that is, it may in part connect with truth, yet be assumed 'all true' or
absolute, by selective observation based on power dynamics for reasoning,
which gets into brute force peer pressure to engineer truth via bullying
dynamics, censorship, violence against unshared views, blacklisting,
attacks on equipment and tools, etc, to shut down the other observations
that error check and correct and *falsify* the believers code, who make
their bread on lies and deception, knowingly or not. thus:
truth <--> logic <--> [math/lang] <--> [patterns]
and in this same way, the observers and perceptual framework could exist
in a paradoxical approach, more towards mathesis in terms of higher
literacy, whereas the binary is by comparison illiterate to everything
outside it limited and controlled framework...
truth <--> logic <--> [code] <--> [patterns]
And all of this about 'reality' and issues of shared observation and
identity, shared and unshared, that allows 'truthful' and false patterns to
exist and /represent/ ideas, events, people, accurate or not. mathematics
and language are both reliant on logic and truth, and the verification of
pattern recognition is in A:A and A:B dynamics, which are evaluated and
justified via truth and logic, and a too-simple approach is a basis not
only for structural insecurity, it can be a planned exploit of civilization
and thus as the "language" or discourse continues in confusing by assuming
A=B, many nefarious activities are allowed within that inaccurate context.
true evil, and its justification on the normalization of these dynamics and
the mediocrity that is allowed and allows for it, as a 'consensus view'
that is based in non-truth, only ideologically accurate to a partial view
(pT=>0, whereby B>A).
that is a context for crypto then, because 'secret communication' and
'hidden writing' can occur both within mathematic and linguistic structure
that is in that same context, including an undifferentiated logic, whereby
the binary may exist in a bounded realm that the 3-value or N-value could
likewise inhabit and move in and through and outside of, via its other
dimensionality, yet more accurately account for absolutes (1 and 0) due to
a weighted, more accurate evaluative framework for shared empiricism than a
rough, coarse, inaccurate all-or-nothing approach that is knowingly false
from the start, in that it is unreal, detached from limits of observation
and made into a fiction, and thus fictionalizes everything as its result.
in other words: [patterns] can be in superposition, yet not in a binary
mindset because they can not be evaluated this way, as /ideas/. instead it
remains shallow and on the surface of the sign, too simple pattern
recognition whereby the belief that A=A is its own confirmation as long as
the pattern matches, the image is believed to be what it is, then it is by
default correct and true (1), due to the sign itself, not its grounding.
truth <--> logic <--> crypto <--> [patterns]
Thus if considering ideas in this context, ideas of patterns, ideas of
crypto, the models of what are going on _must be accounted for within truth
and within an accurate logical evaluation and a binary approach (via logic)
is not this-- it is like playing paddy-cake paddy-cake to get the results
and seeing the layer cake as an end in itself, its own verification and
self-validation, if not narcissism-- i wear the badge, therefore i must be.
in other words, as is mentioned many times over a crypto system is not
inherently or necessarily a secure system just because it is cryptographic
though some may relate to [crypto] as a sign that equates with it without
getting into the error checking of ideas, truth of models, and assume or
allow models that cannot be tested and thus, limit/exploit scenarios by
this approach, where crypto functions against the role of crypto in society
and 'the sign' becomes its own antithesis, whereby 'to encrypt' is actually
'to decrypt' in another hidden context-- and that logically, when only
partial truth is active, this is probable, beyond 50% likelihood given that
several false assumptions may be relied upon that the truth is only minor
about what security may exist- say with factoring outside of quantum or
other computing architectures, which become dogmatic, faith-based beliefs
that everyone knows are bounded observations- thus contingent, unless you
have access to the deep underground labs or other galaxies resources.
it is the same situation with architecture and anti-architecture or those
who look human yet have antihuman agendas (bladerunner-esque), in that the
sign of something can be camouflage, a ploy, a substitute or stand-in that
is not the thing itself (mimic) and references another unshared grounding
(say A-> B) versus what is assumed (A-> A'). so, the signage could be
pointing in a given direction, yet going in the opposite, and in this way
instead of modeling truth and aligning with it (A=A) it could be subverting
and moving away from it (B), yet appear to static or "said to be moving
toward it via language and reference to other signs" (A=>A' actually B=>B').
in this way, [crypto] can move towards falsity in a binary framework, yet
with paradox this falsity could be multiple, beyond those controlled by the
binary approach and its /controlled signage/, beyond the limited threshold
and its particular interpretation, thus feasibly invisible, incalculable.
this would require reframing thesis-antithesis (and synthesis) in a dueling
context of binary and paradoxical logic, which itself would be the compass
and basis for a kernel, from my naive view, for the core of the dynamics.
another way of saying it: you can have all the code you want, yet if it is
not grounded you're fucked.
--- conceptualization of hidden interiority --
i found these paintings online that to me indicate a conceptual correlation
with visualization of the expanded bit sets in their venn context...
# Ordered Chaos 12 & 14
http://www.mnartists.org/work.do?rid=339132
http://www.mnartists.org/work.do?rid=339132&pageIndex=90
# Tao Of Physics, Quantum Space
http://www.well.com/~hendrix/TaoOfPhysics.html
--- decrypt for feedback ---
_ |v JL 3 p\ w Z 7r : 2 6
I N T E R E S T i N G
1
0
John Gilmore assesses NSA disclosures to EFF on encryption,
security, operations, more:
NSA FISA Business Records Offer a Lot to Learn
http://cryptome.org/2013/09/nsa-fisa-business-records.htm
1
0
// apologies- yet another attempt at error correction of a previous
statement and clarification.
quote: Subvert logical reasoning, disallow it, including freedom of speech
and thinking and censoring and controlling what facts are allowed -
controlling POV - then the opposite occurs: A|B ---> B, such that T => pT
This is the code exploit of the Binary Crypto Regime, where B(0)=A and
pT(0)>T(1)
--- clarification on computational approach ---
I made an error in description of processing in the context of infinities,
stating one infinity to the next is evaluated as if a serial approach when
instead this would be nonlinear and require massively parallel processing,
along with serial evaluations in a looping evaluative heuristic - testing
against a hypothesis or model, 'running code' or living code' as it were,
versus a static one-time interaction of data and algorithms, instead more
like a situation of intelligent life in a bounded context as if data
aquarium or code planetarium.
the reason for this parallelization relates to considering all the combined
permutations in terms of probabilities, and thus [x][y][z] as variables are
not necessarily, seemingly, about an algorithm that reveals a structure
that helps move from x->y->z by some mathematical structure, or so that is
my naive guess, such that if you use conventional crypto approach #1
something may be revealed between these that matches an equation pattern,
provides order within the chaos of variability, until legible,
intelligible.*
In other words, instead of XYZ being a serial number that could extend
linearly onward toward infinity, that is: [xyz] ...[∞], and that "string"
is a horizontal number or code, that can in particular be related perhaps
to binary on-off processing in a highly efficient manner, processing and
computational speed and largest prime numbers as context-- instead, the
assumption for this same situation in another crypto framework is that it
could be happening 'vertically' like a slot machine that runs to bounded
infinities (largest primes or not), within each variable, and thus [xyz]
may not have a discernible linear structure or overall equation that makes
sense of the resulting 'horizontal' string. such that:
[x][y][z] => [n¹][n²][n³]...[nⁿ]
whereby [n] is variable and could be anything- a number, a function, a
calculation, null, its own computation. And in this way, each variable
could tend towards infinity or its own structuring, within the string,
whose length is not so much the issue as the difficulty in resolving its
total structure, especially linearly, such that [n¹²³] would not be
decipherable running algorithms across its horizontal string and instead
solving for each variable or say grouped variables in the string, eg.
[n¹][n²⁻³][n⁴⁻⁹]
Thus, while i have no actual idea of how crypto and binary code relate in
terms of encryption methods and decryption, it is assumed this approach
remains serial and directly interrogates the serial string to reveal its
structure, across various formats of the code (various programming,
encoding and other data formatting schemes). Thus, a binary string would be
an example, 10100011001010001010101010010101, whereby to solve for
[xyz...n] would involve finding the overall linear structure that provides
for such linear organization, say assuming it is encrypted code
*)S)*S*))SA&*S&**S()S*S)aAUIHNL*0, and therefore the assumption would
remain that each variable is related to the next in some 'coherence' and
solving one part or layer may reveal another, such as
HSKSLLILHSILALSWLWLSDUI and thus the string [xyz] is made intelligible by
this coherence within the linear string, across that massive horizontality
(very large streams of data that contain data and programs and messaging).
Whereas for a paradoxical logic approach, each variable could itself be
'many' in place of a single bit- or the boundary of the single bit could be
[N] and move towards a bounded infinity, a mathematical function, or other
calculation in that same location.
disclaimer, stating the obvious, i have no idea what this is in terms of
applied cryptography, there is tremendous gap between these statements and
actual code, though to me the approach is much more accurate as "thinking
code" that involves human processing via logical reasoning, parallel and
serial processing, and thus the very idea of a string of code in that view
could also function as signal in noise or even absolute truth, in terms of
messaging. and so it is obvious 'binary thinking' is not like everyday
evaluation in the sense that there is grey-area to mediating events, a
pause to decision- yet within this pause, bounded infinities of hypotheses
can be queried (referencing previous instances in stored or external
memories) that then influence the tallying of the response, which most
likely will be weighted between 1 and 0, unless purely ideological.
Thus- *conceptually*- to consider "code" in this human context, of a living
breathing idea that is grounded in empirical truth in a shared human
viewpoint, that is to be shared as information, via exchange, it is more
grayscale than 10110101010100001, in terms of language and how thinking
functions, more about looping and weighting of variables than having a
*single correct result* when there can be several overlapping or
contrasting interpretations *at the same time*. So imagine if the binary
string had each bit that was variable instead in a 0-9 scale of weighting
the evaluation, such that 10927238292340246.
This moves the [binary] string into a fragmented string of variables, more
like analog computation [1][0][9]...[6]. In this way it is to consider the
'bit' as N-variable, and thus what if it were the alphabet instead of
numbers: 26 letters possible for each bit: USOWHLSELNSQAHBVY
the issue being that like a slot machine, those [N] variable bits could
tally up any potential letter of 26, or +10 numbers with alphanumerics, or
add lower case and punctuation or symbols and suddenly a small 'string' of
data could involve huge interrelational structures that may or may not be
related across the horizontal span, depending on how it is constructed via
algorithms and conceptual formatting. Maybe this already is the way
transformed code is achieved with taking a certain sized content- variable
[x], and then transmuting its entirety into a string or stream of
obfuscated data that must be 'worked at' to decrypt or be translated to
make use of.
The seeming difference would be computationally, how this relation exists
in processing, in terms of hardware and software, though also thinking,
programming. Because what if there is a limit to these transmutations that
is forced into a binary 1/0 and thus bounds these infinities to only
certain algorithmic space, or even computationally, that such numbers
cannot be adequately computed and thus *do not exist* as calculations
within machines and software approaches, crypto perhaps especially, when
the security they would provide would be unfathomable in terms of existing
brute force calculations of 'linear' patterns.
my speculation is of an unknowing of applied cryptography and computer
programming yet knowing of logical reasoning and empirical thinking,
awareness, and how the two are ideologically at odds in approach in terms
of basic assumptions. thus within my condition of 'illiteracy' there is an
attempt to share an idea (pT) about a shared situation from an outsider
vantage, with those of highest literacy of applied code, yet within what to
my observation is a flawed idea and based on false and inaccurate
assumptions, in particular the primacy of binarism for security when this
nonlinear/multilinear computation (parallel & serial) would easily defeat
it.
such that it is not about strings and instead parallel sets: [x|x|x|x]...[n]
as the [variable] yet this may not be coherent in a horizontal algorithm to
solve, it may not have 'rationality' across, from one digit to the next,
revealing its hidden structure. instead, randomness would be inherent
instead of woven into the code, it would be more revealing information out
of noise structures than putting information into noise that is bounded and
can be shaped into structure. in this way also, noise could have structure
yet not lead to decryption, it may be a false corridor within the ever
expanding maze.
it is that [N] variables each are in superposition, not static by default,
finite and absolute, and instead 'truly variable', unbounded to a certain
extent (infinities within infinities across infinities via nested sets).
the conceit or test of the heresy would be 256 'bit' quantum computer that
solves 256 AES, though if it were a binary string this could even be
trivial, versus say [N]-bit, which seemingly could take *forever* to
evaluate, via running, looping code evaluation and a shared empirical model
that develops alongside, out of and through the technology as a 'thinking
machine'-- which, the more it is like the human brain, the more likely the
messaging could be made sensible via existing concepts and structures to
test against, evaluating patterns and looking for correlations. in that
context, a three bit [N]-variable string of code could probably defeat all
computing power today, especially if large expanses were allowed, numbers,
letters, symbols-- it would be unsolvable potentially, extremely probable.
Largest primes would be a minor detail, another variable seemingly in such
a context, due to its potential for incoherence and complexity.
likewise, this [N]-bit approach for random number generators, yet why not
random outside of 1/0 as a noise field, generating strings via a two
[N]-variable string, just let it run and tap that, without or without
structure, would it even matter. in other words: take any two ideas, any
two signs or symbols or colors or whatever, and relate them and tally and
extend this as a process. that is proto-language in a nutshell, this the
crazy nut cracked open yet beyond the insanity of my own incapacity to
communicate and flaws in understanding-- there is something about this
approach and basically observation that has *coherence* that is absent in a
binary approach and serial algorithms-- because that is not how people
think or communicate, it is N-dimensional, geometrical, looping. and
processors and code and software at present cannot model this, allow for
it. and that formats reasoning, perception, what options are available to
share ideas and evaluate them, and we are stuck in binary because it is
enshrined both in technology though also in institutions-- it is the dead
static code of shared ideological non-thinking that is pushing
decision-making and actions towards its deterministic end game, which is a
onesided machine-based value system, devoid of life, nature, and humanity,
except insofar as it profits its own continuing automated development and
further extension.
so the gap between my illiterate views and the actuality of implemented
security code by those literate is one aspect, though another is my
literacy in thinking code and the illiteracy of thinking within
foundational technology, its infrastructure, and the result of this, which
requires a world like it is, and relies on bad code and ideas to allow for
it. thus an audit or accounting of the situation, an attempt to get across
the idea that there is a model of dumb, unintelligent code at the base of
this situation, the approach is so flawed as to be the basis for tyranny,
and it ties into 'ideology' across platforms, individuals and groups of
people to software/hardware and bureaucratic systems, and in that 'combined
state' of a false-perspective empire, the kernel is corrupt and the whole
thing invalid, including at the constitutional level which itself is
ignored, by binary default, the epic loophole of relativistic frameworks
allowing the fiction and its virtuality to replace shared logical
reasoning, because truth and logic can simply be ignored, 'privatized'. and
enclaves can rule over others as if a caste-system via technology and
ideological assumptions that function as religion, technologists as
priests, gods of this technocratic utopia, the peasants not having the
understanding to operate in such a realm, as guaranteed by the originating
lie and tradeoff that allows for all of this to continue. that absolute
truth is an everyday condition and you get to choose what to believe as if
a right or protected mode of operation, no matter how many others must
suffer for it, to sustain the illusion and shared delusion.
the cloud here in the corrupted model a state filing cabinet, digital
bureau for the bureaucracy, citizens organizing info into others invisible
folder structures, volunteering the data via handover, designed into the
technology itself as a marketing and communications strategy. the sieve of
private data is equivalent to entire populations seeking out pickpockets to
hand over their contents, incentivized as it is. and so 'security' is as if
a kind of institutional transparency in relation to a corrupted, failed,
rogue state that can read and see everything you are doing, whether or not
encrypted, dumb terminals every computer to the state mainframe, rebranded
and rebadged, hidden, 'anonymous'.
--- more of this insane ungrounded viewpoint --
it was mentioned a three variable 'string' [x|y|z] would be differently
approached if parallel versus serial, in that each bit of a binary string
could be N-variable in a parallel approach, or so it is assumed possible,
as with probabilities and slot machines, or basic everyday observation of
events and what enters and exits consciousness given context. and while not
knowing the depth of this in terms of cryptography, completely out of my
depth, it would seem the concept of keyspace could relate to how such a
'paradoxical string' could exist, given the boundary for determining what N
could be for [x], [y], [z]. For instance if it were binary ones and
zeroes, the probabilities could be run and 8 different permutations or
combinations: 111, 100, 110, 101, 010, 011, 001, 000.
And within that, perhaps there is meaning. Yet if 'the probabilities' are
changed via [N]-bit variables, it could go all the way to infinity for a
single variable, and thus BIG BANG inflate via probabilities into a huge
keyspace, perhaps unpacking structures this way that reference others
already developed, as if infrastructure being revealed that connects with
others elsewhere, via wormhole-like connectivity and then closing down upon
successful messaging, thus encrypting and decrypting via few variables, via
inherent yet hidden structural relations within these combinations, which
could be infinities related to infinities and then the issue of how to find
them or what to look for. Black box yet even moreso, RNG as model for
signal, not noise, thus tending toward psychic Random Event Generator as if
innate sense of animals before catastrophe, cosmic faults and folds.
the idea or difference is paradox- essentially *superposition* of the bit
as [N]-variable, no longer finite and static, potentially active and
transformative, diagnostic even in a sensor sense of the analogue as queued
circuit. What if alignment occurs in the string under certain conditions
and not others, what if it tunes in and structures revealed, decrypt, yet
out of tune it vanishes, code collapse or changes as with temperature
sensing colors, and the variables change, mask into background, returning
to mystery. It does not seem that computers today can even adequately allow
for infinity, a single bit of this, versus a larger parallel string- and
what might that mean about thinking, too. nothing more than finite discreet
thoughts, one decision to the next unconnected, unless largest prime, say
rogue US terror-state pwns earth as if master discourse, shared POV, even
though ungrounded- this the dumbed down unintelligent lowliest shared
viewpoint of situations in their depth, instead made shallow, sold as daily
headline? the CODE makes it so, in brains and machinery and bureaucracy.
binary is the enforced and corrupted 'shared state', conceptually and
ideologically, yet it is a false belief.
the issue then of shared and unshared identity, belonging or not belonging
to this 'master/slave' thinking...
shared ID <-----> unshared ID
And how this relates to default interpretations, the quickest route for
'feedback' and determining events based on perspective... are you binary or
paradoxical?
Can you make sense of your own consciousness or must you take on false
consciousness to function in society and go about decision-making in its
frameworks, taking on its value systems yet which fragment a person from
their own 'true' self, taking over and reformatting and reprogramming a
life to serve the machine agenda over and against 'shared humanity' -- now
an unshared identity, via private relativistic ideology. sell out your
ancestors and neighbors for a place in the machine...
Quickest route to thinking- *binary* of course, processor speed as if
SUPERSMART! --- "look- i can decide things and determine things
irrespective of their actual truth, and it works for me and others,
everyone else is just lazy!" Like water flowing downhill, 'logical
reasoning' turned into Price is Right PLINKO game, quick and easy
'automated reasoning' via path of least resistance aided and abetted by
binary ideology, creating friction-free virtual universe, mind detached
from body by also flawed historical beliefs, enabling this madness its
onesided platform. the trope of largest prime 'uncorrected ideological
perspective' the trophy award for the most stupid, greedy, and ignorant. an
entire society and civilization built around rewarding those whose
activities align with this, against human conscience and its needs, that
then is viewed as the enemy.
--- major social dynamic ---
ideologically there is a differentiation in terms of the process of
reasoning, how information is parsed...
intelligent <-----> smart
also, how shared identity may differ between empirical and relativistic
models of truth...
truth <-----> partial truth
and the difference in conceptualization, reliance on how frameworks are
constructed, tested...
ideas <-----> facts
and this directly relates to issues of observation and cybernetics (looping
circuitry)...
fallible observer <-----> infallible observer
error-correction <-----> no error correction
In this way 'inflated' or 'bubble' views can rely on warping, skew,
distortion for their truth which is verified by conforming to a false or
inaccurate model reliant on a limited *protected* or SECURED version of
pseudo-truth (pT), as if shared empirical reality (T) removed of error,
because it is believed to be, via ideology.
grounded empiricism <-----> ungrounded relativism
In this way a 'private worldview' can replace 'the public' view as if a
shared domain, and become the basis for one-sided 'reasoning' depending on
authoritative beliefs, where facts can be chosen to fit the model, others
discarded, to uphold the perimeter, basically privatizing perspective to a
finite inaccurate view as the exploit.
reality (1) <-----> false-perspective (0)
humanity <-----> the state (?)
There is always the possibility that this was planned in advance as a
cosmic setup from the beginning, and therefore the state could be doubled,
paradoxical, existing both in the shared truth of humans and in the lies of
the false viewpoint...
humanity <-----> state (T|F)
In this way the two state solution could be moving those 'false' on the
side of humanity over to the false state, and the true state over to side
with humanity, via reversal of dynamics, trapping the exploiters within
their own rigged game...
human state (1) <-----> rogue state (0)
And thus doubled or backdoor crypto could be vital to this process, itself
constituting the trap while transcending this context of surveillance and
putting it to use for human goals and values, working-through this hell
into the birth of new cosmic civilization, of shared identity, as this
relates to eco|soc|pol-issues, shared set evaluations for money and taxes
and policy and direction slash governance, versus the corrupt code and its
circuits etched into the world and minds today as pain, suffering, terror,
horror, insanity.
// * the following repeated text in case superscript numbers do not
translate, for reference:
In other words, instead of XYZ being a serial number that could extend
linearly onward toward infinity, that is: [xyz] ...[infinity], and that
"string" is a horizontal number or code, that can in particular be related
perhaps to binary on-off processing in a highly efficient manner,
processing and computational speed and largest prime numbers as context--
instead, the assumption for this same situation in another crypto framework
is that it could be happening 'vertically' like a slot machine that runs to
bounded infinities (largest primes or not), within each variable, and thus
[xyz] may not have a discernible linear structure or overall equation that
makes sense of the resulting 'horizontal' string. such that:
[x][y][z] => [n^1][n^2][n^3]...[n^n]
whereby [n] is variable and could be anything- a number, a function, a
calculation, null, its own computation. And in this way, each variable
could tend towards infinity or its own structuring, within the string,
whose length is not so much the issue as the difficulty in resolving its
total structure, especially linearly, such that [n^123] would not be
decipherable running algorithms across its horizontal string and instead
solving for each variable or say grouped variables in the string, eg.
[n^1][n^2-3][n^4-9]
⚔
2
2